featureWhere in the world is your AI? Identify and secure AI across a hybrid environmentAs AI becomes integral to systems brought into the enterprise ecosystem it is increasingly critical for security teams to know where it is and reduce its risks. By Deb RadcliffApr 17, 20249 minsApplication SecurityCloud SecurityNetwork Security news analysis Researchers uncover evasion data exfiltration techniques that can be exploited in SharePointBy Lucian ConstantinApr 09, 20246 minsThreat and Vulnerability ManagementData and Information SecurityNetwork Securityfeature US federal agencies get first crack at expanded Microsoft 365 logging capabilitiesBy Susan BradleyApr 08, 20247 minsWindows SecurityNetwork SecuritySecurity Practices newsMeta sued for snooping on Snapchat usersBy Sandeep Budki Mar 28, 20244 minsHackingLegalNetwork Security brandpostSponsored by FortinetDon’t let microbranch security be your network’s weak linkBy Nirav Shah Mar 27, 20245 minsNetwork Security newsCisco patches serious flaws in Expressway and ClamAVBy Lucian Constantin Feb 09, 20243 minsNetwork SecurityVulnerabilities news analysisTime running out to patch Jenkins CI/CD server vulnerabilityBy Lucian Constantin Jan 30, 20244 minsNetwork SecurityRisk ManagementVulnerabilities feature10 penetration testing tools the pros useBy Maril Vernon Jan 29, 202411 minsHackingData and Information SecurityNetwork Security news analysisCisco patches critical vulnerability in Unified Communications productsBy Lucian Constantin Jan 26, 20244 minsNetwork SecurityVulnerabilities Articlesnews analysisOver 178,000 SonicWall firewalls still vulnerable to old flawsDenial of service and remote code execution possible if organizations don't upgrade their SonicWall firmware.By Lucian Constantin Jan 17, 2024 4 minsNetwork SecurityVulnerabilitiesnewsVMware patches critical access control vulnerability in Aria AutomationThe company urges customers to update and patch Aria Automation immediately. By Lucian Constantin Jan 16, 2024 3 minsAccess ControlNetwork SecurityVulnerabilitiesfeatureProtecting Windows networks: Get back to basics for the new yearWhile it may be tempting to adopt new Microsoft Windows network protection tactics, methods, and software, a better approach is to review and refine what’s already in place. By Susan Bradley Jan 09, 2024 6 minsPasswordsWindows SecurityIdentity and Access ManagementfeatureEssential skills for today’s threat analystsKnowledge across different programming languages and tools, machine learning, and artificial intelligence are some of the technical skills threat analysts will need to tackle cyber threats in 2024.By Rosalyn Page Jan 02, 2024 10 minsThreat and Vulnerability ManagementData and Information SecurityNetwork SecuritynewsBSIMM 14 finds rapid growth in automated security technologyEmbrace of a "shift everywhere" philosophy is driving a demand for automated, event-driven software security testing.By John Mello Jr. Dec 06, 2023 4 minsApplication SecurityNetwork SecurityfeatureBatten down the hatches: it’s time to harden every facet of your Windows network Gone are the days when a protected OS kept the bad guys out. Hardening authentication, the help desk, and log files in place is now needed to beat the bad guys.By Susan Bradley Nov 22, 2023 7 minsPhishingWindows SecurityNetwork Securitynews9 in 10 organizations have embraced zero-trust security globallyNearly all of them still have a long way to go according to a new Cisco report.By John Mello Jr. Nov 22, 2023 4 minsZero TrustNetwork Securitynews analysisAT&T’s mysterious MSSP spinoff could have upsides for its security consulting businessAT&T is spinning off part of its cybersecurity business, joining a venture firm to create a new managed security services provider (MSSP) entity, for faster growth.By Jon Gold Nov 21, 2023 3 minsManaged Service ProvidersNetwork SecurityopinionDeception technology use to grow in 2024 and proliferate in 2025"Perfect storm" of innovation trends will make deception technology a staple, changing the dynamics of the asymmetric threat landscape.By Jon Oltsik Nov 13, 2023 6 minsThreat and Vulnerability ManagementNetwork Securitynews analysisCisco patches serious flaws in Firepower and Identity Services EngineThe high-risk vulnerabilities could allow command injection or lead to a denial-of-service condition.By Lucian Constantin Nov 06, 2023 4 minsNetwork SecurityVulnerabilitiesnews analysisHelloKitty ransomware deployed via critical Apache ActiveMQ flawAn unidentified group used the ActiveMQ flaw to install ransomware at two organizations. Users should upgrade the software.By Lucian Constantin Nov 02, 2023 4 minsRansomwareMalwareNetwork SecuritynewsMicrosoft pledges cybersecurity overhaul to protect products and servicesMicrosoft launches the Secure Future Initiative to usher in “next generation” of cybersecurity to better protect customers against escalating cybersecurity threats.By Michael Hill Nov 02, 2023 9 minsInternet SecurityApplication SecurityNetwork Security Show more Show less View all Resources whitepaper The Evolution of Network Intelligence in the Digital Age Progress and growth opportunities in network visibility and automation The post The Evolution of Network Intelligence in the Digital Age appeared first on Whitepaper Repository –. By Comcast Business 15 Apr 2024Application Performance ManagementBusiness OperationsNetwork Security whitepaper The CIO’s Roadmap: Solving Networking and Security Challenges with SASE By CBTS 04 Apr 2024Application Performance ManagementNetwork MonitoringNetwork Security whitepaper Inline Prevention vs Post-Attack Mitigation By AccuKnox Inc. 21 Feb 2024Cloud SecurityData and Information SecurityNetwork Security View all Podcasts podcastsSponsored by CiscoSecure Remote Working: what we’ve learnt and where we go from hereSecure Remote Working is a podcast series looking at how organizations have had to adapt during the COVID19 pandemic; the challenges they faced, the solutions they found, and the long-term impact of secure remote working at scale. This series outlines how the threat landscape changed, the cultural and leadership impacts, and the key technologies that have enabled organizations to continue to operate in difficult circumstances.3 episodesRemote Access Security Ep. 01 Episode 1: Preparing for the next phase in secure remote working Aug 10, 202032 mins Security Ep. 03 Episode 3: Guiding CISOs through change planning for the new way of working Aug 10, 202026 mins Security Video on demand videoWhat is zero trust security?Beyond firewalls and perimeter security, a zero trust architecture allows security officials to better protect data and system access to both outsider and insider threats, adopting a mantra of “trust no one”. We explain the concept in this video. Sep 06, 2023 3 minsAuthenticationZero TrustNetwork Security Get up to speed on SASE: What’s driving demand and how providers’ capabilities differ Oct 15, 2021 26 minsSASENetwork SecuritySecurity WAN evolution: From SD-WAN to Secure Access Service Edge (SASE) Jun 25, 2021 31 minsSASESD-WANNetwork Security How have network firewalls evolved? Apr 30, 2018 FirewallsNetwork MonitoringNetwork Security See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos brandpost Sponsored by Palo Alto Networks Rethinking work dynamics: Why consumer browsers are no longer enough By Ofer Ben-Noon, SASE CTO, Palo Alto Networks Apr 19, 20244 mins Cloud Security news Ransomware feared in Octapharma Plasma’s US-wide shutdown By Shweta Sharma Apr 19, 20243 mins Ransomware news Top cybersecurity product news of the week By CSO staff Apr 19, 202479 mins Generative AISecurity podcast CSO Executive Sessions: Geopolitical tensions in the South China Sea – why the private sector should care Apr 02, 202416 mins CSO and CISO podcast CSO Executive Sessions: 2024 International Women's Day special Mar 13, 202410 mins CSO and CISO podcast CSO Executive Sessions: Former convicted hacker Hieu Minh Ngo on blindspots in data protection Feb 20, 202421 mins CSO and CISO video CSO Executive Sessions: Geopolitical tensions in the South China Sea – why the private sector should care Apr 01, 202416 mins CSO and CISO video CSO Executive Sessions: 2024 International Women's Day special Mar 13, 202410 mins CSO and CISO video LockBit feud with law enforcement feels like a TV drama Mar 05, 202456 mins RansomwareArtificial Intelligence