newsMeta sued for snooping on Snapchat usersA group of advertisers is suing Meta for its Project Ghostbusters, which was allegedly started to intercept and decrypt Snapchat, YouTube, and Amazon traffic.By Sandeep Budki28 Mar 20244 minsHackingLegalNetwork Security brandpostSponsored by Fortinet Don’t let microbranch security be your network’s weak linkBy Nirav Shah27 Mar 20245 minsNetwork Securitynews analysis Exploit available for critical flaw in FortiClient ServerBy Lucian Constantin22 Mar 20243 minsCyberattacksNetwork SecurityVulnerabilities featureTeams, Slack, and GitHub, oh my! – How collaborative tools can create a security nightmareBy Susan Bradley 19 Mar 20247 minsWindows SecurityApplication SecurityCloud Security featureWhat is SIEM? How to choose the right one for your businessBy Josh Fruhlinger and Tim Ferrill 13 Mar 202412 minsSecurity Information and Event Management SoftwareNetwork SecuritySecurity featureThinking beyond BitLocker: Managing encryption across Microsoft servicesBy Susan Bradley 12 Mar 20247 minsEncryptionWindows SecurityNetwork Security news analysisVMware patches critical flaws that could allow attackers to escape VMsBy Lucian Constantin 07 Mar 20243 minsNetwork SecurityVulnerabilities news analysisMalicious email campaign steals NTLM hashesBy Lucian Constantin 04 Mar 20244 minsPhishingWindows SecurityNetwork Security featureWhat is phishing? Examples, types, and techniquesBy Christine Wong 20 Feb 202410 minsPhishingSocial EngineeringNetwork Security ArticlesnewsCisco patches serious flaws in Expressway and ClamAVThe vulnerabilities could enable cross-site request forgery in Expressway products and denial-of-service attacks in ClamAV. By Lucian Constantin 09 Feb 2024 3 minsNetwork SecurityVulnerabilitiesnews analysisTime running out to patch Jenkins CI/CD server vulnerabilityThreat actors are already scanning the internet for vulnerable Jenkins servers after a proof of concept was published.By Lucian Constantin 30 Jan 2024 4 minsNetwork SecurityRisk ManagementVulnerabilitiesfeature10 penetration testing tools the pros useAutomated and open source tools can help you conduct web application, network, and database penetration tests.By Maril Vernon 29 Jan 2024 11 minsHackingData and Information SecurityNetwork Securitynews analysisCisco patches critical vulnerability in Unified Communications productsCisco Unified Communications customers are urged to patch this high-severity vulnerability or mitigate its risk.By Lucian Constantin 26 Jan 2024 4 minsNetwork SecurityVulnerabilitiesnews analysisOver 178,000 SonicWall firewalls still vulnerable to old flawsDenial of service and remote code execution possible if organizations don't upgrade their SonicWall firmware.By Lucian Constantin 17 Jan 2024 4 minsNetwork SecurityVulnerabilitiesnewsVMware patches critical access control vulnerability in Aria AutomationThe company urges customers to update and patch Aria Automation immediately. By Lucian Constantin 16 Jan 2024 3 minsAccess ControlNetwork SecurityVulnerabilitiesfeatureProtecting Windows networks: Get back to basics for the new yearWhile it may be tempting to adopt new Microsoft Windows network protection tactics, methods, and software, a better approach is to review and refine what’s already in place. By Susan Bradley 09 Jan 2024 6 minsPasswordsWindows SecurityIdentity and Access ManagementfeatureEssential skills for today’s threat analystsKnowledge across different programming languages and tools, machine learning, and artificial intelligence are some of the technical skills threat analysts will need to tackle cyber threats in 2024.By Rosalyn Page 02 Jan 2024 10 minsThreat and Vulnerability ManagementData and Information SecurityNetwork SecuritynewsBSIMM 14 finds rapid growth in automated security technologyEmbrace of a "shift everywhere" philosophy is driving a demand for automated, event-driven software security testing.By John Mello Jr. 06 Dec 2023 4 minsApplication SecurityNetwork SecurityfeatureBatten down the hatches: it’s time to harden every facet of your Windows network Gone are the days when a protected OS kept the bad guys out. Hardening authentication, the help desk, and log files in place is now needed to beat the bad guys.By Susan Bradley 22 Nov 2023 7 minsPhishingWindows SecurityNetwork Securitynews9 in 10 organizations have embraced zero-trust security globallyNearly all of them still have a long way to go according to a new Cisco report.By John Mello Jr. 22 Nov 2023 4 minsZero TrustNetwork Securitynews analysisAT&T’s mysterious MSSP spinoff could have upsides for its security consulting businessAT&T is spinning off part of its cybersecurity business, joining a venture firm to create a new managed security services provider (MSSP) entity, for faster growth.By Jon Gold 21 Nov 2023 3 minsManaged Service ProvidersNetwork Security Show more Show less View all Resources whitepaper Data Protection in a Multicloud World Data protection challenges resulting in disruption are on the rise with public clouds and cyberattacks the leading areas of concern. Organizations that continue to modernize data protection can minimize risk and raise confidence levels The post Data Protection in a Multicloud World appeared first on Whitepaper Repository –. By Dell Technologies 18 May 2023Cloud SecurityData and Information SecurityMulti Cloud whitepaper Top reasons why customers choose Dell VxRail By Dell Technologies 18 May 2023Infrastructure ManagementIT ManagementSystem Management whitepaper The Long Road Ahead to Ransomware Preparedness By Dell Technologies 17 May 2023Cloud SecurityRansomwareSecurity View all Video on demand videoWhat is zero trust security?Beyond firewalls and perimeter security, a zero trust architecture allows security officials to better protect data and system access to both outsider and insider threats, adopting a mantra of “trust no one”. We explain the concept in this video. 06 Sep 2023 3 minsAuthenticationZero TrustNetwork Security Get up to speed on SASE: What’s driving demand and how providers’ capabilities differ 15 Oct 2021 26 minsSASENetwork SecuritySecurity WAN evolution: From SD-WAN to Secure Access Service Edge (SASE) 25 Jun 2021 31 minsSASESD-WANNetwork Security How have network firewalls evolved? 30 Apr 2018 FirewallsNetwork MonitoringNetwork Security See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news AT&T suffers critical breach impacting 73 million customers By Shweta Sharma 01 Apr 20244 mins Data Breach feature Recruit for diversity: Practical ways to remove bias from the hiring process By Aimee Chanthadavong 01 Apr 20248 mins Careers feature The CSO guide to top security conferences By CSO Staff 01 Apr 202417 mins Technology IndustryIT SkillsEvents podcast CSO Executive Sessions: 2024 International Women's Day special 13 Mar 202410 mins CSO and CISO podcast CSO Executive Sessions: Former convicted hacker Hieu Minh Ngo on blindspots in data protection 20 Feb 202421 mins CSO and CISO podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO video CSO Executive Sessions: Geopolitical tensions in the South China Sea – why the private sector should care 01 Apr 202416 mins CSO and CISO video CSO Executive Sessions: 2024 International Women's Day special 13 Mar 202410 mins CSO and CISO video LockBit feud with law enforcement feels like a TV drama 05 Mar 202456 mins RansomwareArtificial Intelligence