newsMeta sued for snooping on Snapchat usersA group of advertisers is suing Meta for its Project Ghostbusters, which was allegedly started to intercept and decrypt Snapchat, YouTube, and Amazon traffic.By Sandeep Budki28 Mar 20244 minsHackingLegalNetwork Security brandpostSponsored by Fortinet Don’t let microbranch security be your network’s weak linkBy Nirav Shah27 Mar 20245 minsNetwork Securitynews analysis Exploit available for critical flaw in FortiClient ServerBy Lucian Constantin22 Mar 20243 minsCyberattacksNetwork SecurityVulnerabilities featureTeams, Slack, and GitHub, oh my! – How collaborative tools can create a security nightmareBy Susan Bradley 19 Mar 20247 minsWindows SecurityApplication SecurityCloud Security featureWhat is SIEM? How to choose the right one for your businessBy Josh Fruhlinger and Tim Ferrill 13 Mar 202412 minsSecurity Information and Event Management SoftwareNetwork SecuritySecurity featureThinking beyond BitLocker: Managing encryption across Microsoft servicesBy Susan Bradley 12 Mar 20247 minsEncryptionWindows SecurityNetwork Security news analysisVMware patches critical flaws that could allow attackers to escape VMsBy Lucian Constantin 07 Mar 20243 minsNetwork SecurityVulnerabilities news analysisMalicious email campaign steals NTLM hashesBy Lucian Constantin 04 Mar 20244 minsPhishingWindows SecurityNetwork Security featureWhat is phishing? Examples, types, and techniquesBy Christine Wong 20 Feb 202410 minsPhishingSocial EngineeringNetwork Security ArticlesnewsCisco patches serious flaws in Expressway and ClamAVThe vulnerabilities could enable cross-site request forgery in Expressway products and denial-of-service attacks in ClamAV. By Lucian Constantin 09 Feb 2024 3 minsNetwork SecurityVulnerabilitiesnews analysisTime running out to patch Jenkins CI/CD server vulnerabilityThreat actors are already scanning the internet for vulnerable Jenkins servers after a proof of concept was published.By Lucian Constantin 30 Jan 2024 4 minsNetwork SecurityRisk ManagementVulnerabilitiesfeature10 penetration testing tools the pros useAutomated and open source tools can help you conduct web application, network, and database penetration tests.By Maril Vernon 29 Jan 2024 11 minsHackingData and Information SecurityNetwork Securitynews analysisCisco patches critical vulnerability in Unified Communications productsCisco Unified Communications customers are urged to patch this high-severity vulnerability or mitigate its risk.By Lucian Constantin 26 Jan 2024 4 minsNetwork SecurityVulnerabilitiesnews analysisOver 178,000 SonicWall firewalls still vulnerable to old flawsDenial of service and remote code execution possible if organizations don't upgrade their SonicWall firmware.By Lucian Constantin 17 Jan 2024 4 minsNetwork SecurityVulnerabilitiesnewsVMware patches critical access control vulnerability in Aria AutomationThe company urges customers to update and patch Aria Automation immediately. By Lucian Constantin 16 Jan 2024 3 minsAccess ControlNetwork SecurityVulnerabilitiesfeatureProtecting Windows networks: Get back to basics for the new yearWhile it may be tempting to adopt new Microsoft Windows network protection tactics, methods, and software, a better approach is to review and refine what’s already in place. By Susan Bradley 09 Jan 2024 6 minsPasswordsWindows SecurityIdentity and Access ManagementfeatureEssential skills for today’s threat analystsKnowledge across different programming languages and tools, machine learning, and artificial intelligence are some of the technical skills threat analysts will need to tackle cyber threats in 2024.By Rosalyn Page 02 Jan 2024 10 minsThreat and Vulnerability ManagementData and Information SecurityNetwork SecuritynewsBSIMM 14 finds rapid growth in automated security technologyEmbrace of a "shift everywhere" philosophy is driving a demand for automated, event-driven software security testing.By John Mello Jr. 06 Dec 2023 4 minsApplication SecurityNetwork SecurityfeatureBatten down the hatches: it’s time to harden every facet of your Windows network Gone are the days when a protected OS kept the bad guys out. Hardening authentication, the help desk, and log files in place is now needed to beat the bad guys.By Susan Bradley 22 Nov 2023 7 minsPhishingWindows SecurityNetwork Securitynews9 in 10 organizations have embraced zero-trust security globallyNearly all of them still have a long way to go according to a new Cisco report.By John Mello Jr. 22 Nov 2023 4 minsZero TrustNetwork Securitynews analysisAT&T’s mysterious MSSP spinoff could have upsides for its security consulting businessAT&T is spinning off part of its cybersecurity business, joining a venture firm to create a new managed security services provider (MSSP) entity, for faster growth.By Jon Gold 21 Nov 2023 3 minsManaged Service ProvidersNetwork Security Show more Show less View all Upcoming Events16/Apr roundtable luncheonInnovating safely: Navigating the intersection of AI, network, and security16 Apr 202412:00pm-2:30pm AWSTMount Lawley Golf Club, Perth Network Security View all events Resources whitepaper Webroot DNS Protection – Protect Your Anywhere Workforce and Network From Web-Based Threats This paper explores the security issues that DNS brings and how Webroot DNS Protection helps organisations safeguard against the risks of web-based threats. The post Webroot DNS Protection – Protect Your Anywhere Workforce and Network From Web-Based Threats appeared first on Whitepaper Repository –. By OpenText 23 Mar 2023DNSNetwork SecuritySecurity View all Video on demand videoGet up to speed on SASE: What’s driving demand and how providers’ capabilities differAs enterprises build up their mobile, edge and cloud deployments, they’re being challenged to deliver a more efficient, scalable network-security architecture. Secure access service edge (SASE) is the convergence of security and networking in a cloud-delivered model. Learn what’s driving demand for SASE, how SASE providers’ capabilities differ, and the skills companies need to get started. 15 Oct 2021 26 minsSASENetwork SecuritySecurity WAN evolution: From SD-WAN to Secure Access Service Edge (SASE) 25 Jun 2021 31 minsSASESD-WANNetwork Security How have network firewalls evolved? 30 Apr 2018 FirewallsNetwork MonitoringNetwork Security Is it time to kill the pen test? | Salted Hash Ep 22 18 Apr 2018 12 minsHackingNetwork MonitoringCybercrime See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news AT&T suffers critical breach impacting 73 million customers By Shweta Sharma 01 Apr 20244 mins Data Breach feature Recruit for diversity: Practical ways to remove bias from the hiring process By Aimee Chanthadavong 01 Apr 20248 mins Careers feature The CSO guide to top security conferences By CSO Staff 01 Apr 202417 mins Technology IndustryIT SkillsEvents podcast CSO Executive Sessions: 2024 International Women's Day special 13 Mar 202410 mins CSO and CISO podcast CSO Executive Sessions: Former convicted hacker Hieu Minh Ngo on blindspots in data protection 20 Feb 202421 mins CSO and CISO podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO video CSO Executive Sessions: Geopolitical tensions in the South China Sea – why the private sector should care 01 Apr 202416 mins CSO and CISO video CSO Executive Sessions: 2024 International Women's Day special 13 Mar 202410 mins CSO and CISO video LockBit feud with law enforcement feels like a TV drama 05 Mar 202456 mins RansomwareArtificial Intelligence