Networks

The latest technologies and best practices to secure local, virtual, cloud, and hybrid networks.

  • Must You Use Microsoft’s In-Box DNS?

    By Jeremy Moskowitz, PolicyPak Software In the case of your typical Windows domain network, it is “traditional wisdom” that only Microsoft DNS must be used with Active Directory for internal DNS resolution. Many times this is because: It’s convenient to use the in-box solution The myth that Active Directory requires Microsoft DNS to function properly…


  • How to Mitigate Fourth-Party Security Risks

    While security threats resulting from exposure to third-party partners are serious, security pros face an even tougher challenge from fourth-party security risks. What do we mean by fourth-party risks? Think of fourth parties as the “vendors of your vendors.” Everyone from Amazonian giants to small businesses uses subcontractors. According to a recent BitSight report of…


  • 62 Percent of Employees Have Access to Data They Shouldn’t Be Able to See

    According to the results of a recent survey of 3,027 employees in the U.S., U.K., France and Germany (1,371 end users and 1,656 IT professionals), fully 62 percent of end users acknowledged that they have access to company data they probably shouldn’t be able to see. The study, conducted by the Ponemon Institute and sponsored…


  • Best Next-Gen Endpoint Security Solutions

      Endpoint security is still dominated by traditional anti-virus solutions, with Gartner ranking Symantec, Sophos, Trend Micro and Kaspersky as leaders in the field. But new next-generation endpoint security solutions are generating buzz as either replacements or supplements to existing security investments. These new solutions promise to stop zero-day attacks and ransomware, two big security…


  • 5 Ways to Defuse the Data Threat from Departing Employees

    When employees leave a company and take sensitive data with them, intentionally or not, the repercussions can be massive. In February of this year, an employee leaving the FDIC exposed 44,000 FDIC customers’ personal information when she downloaded the data to her personal storage device. Later the same month, a former employee of UK regulator…


  • Where Should Security Keys be Kept in the Cloud?

    The use of cryptographic keys is a linchpin of modern security. When it comes to the cloud, there is some debate as to where those keys should exist and how their placement impacts cloud security. Andy Ellis, chief security officer at Akamai, has his fair share of experience building and deploying key management infrastructure and…


  • 52 Percent of Consumers Would Pay More for Products or Services with Better Data Security

    According to the results of a recent survey of 2,000 U.S. consumers, 52 percent of respondents would consider paying more for the same products or services from a provider with better data security, and the same percentage said security is an important or main consideration when making purchases. The survey, conducted in April 2016 by…


  • Ransomware and the Internet of Things: A Growing Threat

    Sekhar Sarukkai, Skyhigh Networks “If we had computers that knew everything there was to know about things — using data they gathered without any help from us — we would be able to track and count everything, and greatly reduce waste, loss and cost. We would know when things needed replacing, repairing or recalling, and…


  • Top 7 Full Disk Encryption Software and Solutions

      Download our free Encryption Vendor Report comparing Digital Guardian and Microsoft BitLocker based on reviews, features, and more! Full disk encryption software protects the contents of laptops and other computers by requiring password or multi-factor authentication to be successfully completed before the system can boot, as noted in our full disk encryption guide. To…


  • IoT Security Begins with Risk Assessment

    The FBI’s recently issued warning that newer cars are susceptible to hacking highlights the issue of IoT (Internet of Things) security not only in vehicles, but across the enterprise. Earlier this year security researchers used a $30 webcam to establish a persistent point of access into a network. This type of IoT hack poses a…



Get the free newsletter

Subscribe to Cybersecurity Insider for top news, trends & analysis

This field is required This field is required

Top Cybersecurity Companies