NEWS: NETWORK WORLD SECURITY
Setup News Ticker
   NEWS: NETWORK WORLD SECURITY
Network World Security
Apr 01, 2020

How to prepare Office 365 and Windows for a disaster
With IT and security teams stressed due to the COVID-19 crisis, it's more important than ever to make sure you've prepared your network for a disaster.

Network World Security
Mar 31, 2020

Palo Alto grows SD-WAN platform buy snapping-up CloudGenix for $420M
With an eye towards significantly bolstering its edge networking offerings, Palo Alto has entered into an agreement to buy cloud-based SD-WAN vendor CloudGenix for $420 million in cash.

Palo Alto said upon the completion of the acquisition it will integrate CloudGenix's cloud-managed SD-WAN products to accelerate the intelligent onboarding of remote branches and retail stores into its Prisma Access package. 

More about SD-WAN: How to buy SD-WAN technology: Key questions to consider when selecting a supplier • How to pick an off-site data-backup method •  SD-Branch: What it is and why you'll need it • What are the options for security SD-WAN? Announced in May 2019, Palo Alto's Prisma is a cloud-based security package that includes access control, advanced threat protection, user behavior monitoring and  other services that promise to protect enterprise applications and resources.

To read this article in full, please click here



Network World Security
Mar 30, 2020

BrandPost: 5 Network Security Remedies for Telework
With the COVID-19 (coronavirus) global pandemic, many employers are recommending additional telework to help keep employees safe and productive. More and more, companies are embracing "remote teams" and allowing their employees the opportunity to work from home or telecommute.

Yet home IT devices are still subject to many of the same threats as on-site business devices. Unsecured off-site routers, modems, and other network devices can cause big headaches for employers, and poorly configured home devices can affect the entire organization. They can still be attacked from any device on the Internet, but they are also vulnerable to unauthorized access from neighbors and passersby.

To read this article in full, please click here



Network World Security
Mar 30, 2020

BrandPost: 4 Risks of Waiting to Migrate to the Cloud
If you're responsible for the security of your organization's digital environment, staying up-to-date with the latest hardware, environment, and software vulnerability patches can be a challenge. Migrating your workloads to the cloud can help address these challenges in new, unique ways. Waiting to migrate to the cloud can create unforeseen consequences. Here are four risks of waiting to migrate to the cloud and how CIS resources can help mitigate them. 

Lack of independent security configurations By leveraging virtual machines (VMs) in the cloud, systems admins and CISOs can deploy a single image across multiple workstations. Starting with a base image is an option, but base images lack vendor-agnostic security configurations.

To read this article in full, please click here



Network World Security
Mar 30, 2020

BrandPost: How to Prepare for Your Next Cybersecurity Compliance Audit
Reading a list of cybersecurity compliance frameworks is like looking at alphabet soup: NIST CSF, PCI DSS, HIPAA, FISMA, GDPR…the list goes on. It's easy to be overwhelmed, and not only because of the acronyms. Many frameworks do not tell you where to start or exactly how to become compliant. Cybersecurity best practices from the Center for Internet Security (CIS) provide prioritized, prescriptive guidance for a strong cybersecurity foundation. And, they support your efforts toward compliance with the aforementioned alphabet soup.

When developing your cybersecurity compliance plan, consider the elements below to ensure you have a solid foundation:

To read this article in full, please click here



Network World Security
Mar 30, 2020

BrandPost: NGINX CIS Hardened Images Provide Security at Maximum Efficiency
Just over 50% of the Internet's busiest websites - including Dropbox, Netflix, and WordPress.com - are served or proxied on NGNIX (Source: W3Techs).  But how can organizations secure this popular open-source web server?

At CIS, our mission to help everyone have a secure online experience drives us to develop cybersecurity best practices. We take those best practices, use them to harden machine images, and make them available in the cloud. That's why we're excited about the CIS Hardened Images for NGINX on Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). This pre-configured virtual image is available on a CIS Hardened Linux base image and container image.

To read this article in full, please click here



Network World Security
Mar 25, 2020

How enterprise networking is changing with a work-at-home workforce
As the coronavirus spreads, public and private companies as well as government entities are requiring employees to work from home, putting unforeseen strain on all manner of networking technologies and causing bandwidth and security concerns.  What follows is a round-up of news and traffic updates that Network World will update as needed to help keep up with the ever-changing situation.  Check back frequently!

UPDATE 3.27

Broadband watchers at BroadbandNow say users in most of the cities it analyzed are experiencing normal network conditions, suggesting that ISP's (and their networks) are holding up to the shifting demand. In a March 25 post the firm wrote: "Encouragingly, many of the areas hit hardest by the spread of the coronavirus are holding up to increased network demand. Cities like Los Angeles, Chicago, Brooklyn, and San Francisco have all experienced little or no disruption. New York City,  now the epicenter of the virus in the U.S., has seen a 24% dip out of its previous ten-week range. However, with a new median speed of nearly 52 Mbps, home connections still appear to be holding up overall."

To read this article in full, please click here



Network World Security
Mar 25, 2020

NEWS UPDATE: The impact of COVID-19 on public networks and security
As the coronavirus spreads, public and private companies as well as government entities are requiring employees to work from home, putting unforeseen strain on all manner of networking technologies and causing bandwidth and security concerns.  What follows is a round-up of news and traffic updates that Network World will update as needed to help keep up with the ever-changing situation.  Check back frequently!

UPDATE: 3.26

Week over week (ending March 23) Ookla says it has started to see a degradation of mobile and fixed-broadband performance worldwide. More detail on specific locations is available below. Comparing the week of March 16 to the week of March 9, mean download speed over mobile and fixed broadband decreased in Canada and the U.S. while both remained relatively flat in Mexico. What is the impact of the coronavirus on corporate network planning? Depends on how long the work-from-home mandate goes on really. Tom Nolle, president of CIMI Corp. takes an interesting look at the situation saying the shutdown "could eventually produce a major uptick for SD-WAN services, particularly in [managed service provider]    Businesses would be much more likely to embark on an SD-WAN VPN adventure that didn't involve purchase/licensing, favoring a service approach in general, and in particular one with a fairly short contract period." Statistics from VPN provider NordVPN show the growth of VPN usage across the globe.  For example, the company said the US has ex

Network World Security
Mar 25, 2020

ROLLING UPDATE: The impact of COVID-19 on public networks and security
As the coronavirus spreads, public and private companies as well as government entities are requiring employees to work from home, putting unforeseen strain on all manner of networking technologies and causing bandwidth and security concerns.  What follows is a round-up of news and traffic updates that Network World will update as needed to help keep up with the ever-changing situation.  Check back frequently!

UPDATE 3.27

Broadband watchers at BroadbandNow say users in most of the cities it analyzed are experiencing normal network conditions, suggesting that ISP's (and their networks) are holding up to the shifting demand. In a March 25 post the firm wrote: "Encouragingly, many of the areas hit hardest by the spread of the coronavirus are holding up to increased network demand. Cities like Los Angeles, Chicago, Brooklyn, and San Francisco have all experienced little or no disruption. New York City,  now the epicenter of the virus in the U.S., has seen a 24% dip out of its previous ten-week range. However, with a new median speed of nearly 52 Mbps, home connections still appear to be holding up overall."

To read this article in full, please click here



Network World Security
Mar 23, 2020

Post-coranavirus planning calls for more (not less) investment in tech
The coronavirus crisis is just beginning. But it will end. And how you fare after the pandemic depends on what you do right now. Here are four areas to focus on.

Network World Security
Mar 23, 2020

Post-coronavirus planning calls for more (not less) investment in tech
The coronavirus crisis is just beginning. But it will end. And how you fare after the pandemic depends on what you do right now. Here are four areas to focus on.

Network World Security
Mar 19, 2020

Cisco warns of five SD-WAN security weaknesses
Cisco has issued five  warnings about security weaknesses in its SD-WAN offerings, three of them on the high-end of the vulnerability scale.

The worst problem is with the command-line interface (CLI) of its SD-WAN Solution software where a weakness could let a local attacker inject arbitrary commands that are executed with root privileges, Cisco wrote.

To read this article in full, please click here



Network World Security
Mar 17, 2020

Coronavirus: What companies are ready for our new reality?
One class of companies is already equipped to work in a fully distributed employee model. Another going to have a difficult time adapting to most employees having to work from home. Some won't survive if this lasts more than a few weeks.

Network World Security
Mar 16, 2020

Coronavirus challenges remote networking
As the coronavirus spreads, many companies are requiring employees to work from home, putting unanticipated stress on remote networking technologies and causing bandwidth and security concerns.

Businesses have facilitated brisk growth of teleworkers over the past decades to an estimated 4 million-plus. The meteoric rise in new remote users expected to come online as a result of the novel coronavirus calls for stepped-up capacity.

Research by VPN vendor Atlas shows that VPN usage in the U.S. grew by 53% between March 9 and 15, and it could grow faster. VPN usage in Italy, where the virus outbreak is about two weeks ahead of the U.S., increased by 112% during the last week. "We estimate that VPN usage in the U.S. could increase over 150% by the end of the month," said Rachel Welch, chief operating officer of Atlas VPN, in a statement.

To read this article in full, please click here



Network World Security
Mar 16, 2020

As networks evolve enterprises need to rethink security
Digital innovation is disrupting businesses. Data and applications are at the hub of new business models, and data needs to travel across the extended network at increasingly high speeds without interruption. To make this possible, organizations are radically redesigning their networks by adopting multi-cloud environments, building hyperscale data centers, retooling their campuses, and designing new connectivity systems for their next-gen branch offices. Networks are faster than ever before, more agile and software-driven. They're also increasingly difficult to secure. To understand the challenges and how security needs to change, I recently talked with John Maddison, executive vice president of products for network security vendor Fortinet.

To read this article in full, please click here



Network World Security
Mar 16, 2020

As the networks evolve enterprises need to rethink network security
Digital innovation is disrupting businesses. Data and applications are at the hub of new business models, and data needs to travel across the extended network at increasingly high speeds without interruption. To make this possible, organizations are radically redesigning their networks by adopting multi-cloud environments, building hyperscale data centers, retooling their campuses, and designing new connectivity systems for their next-gen branch offices. Networks are faster than ever before, more agile and software-driven. They're also increasingly difficult to secure. To understand the challenges and how security needs to change, I recently talked with John Maddison, executive vice president of products for network security vendor Fortinet.

To read this article in full, please click here



Network World Security
Mar 09, 2020

Essential things to know about container networking
Containers have emerged over the past several years to provide an efficient method of storing and delivering applications reliably across different computing environments. By containerizing an application platform and its dependencies, differences in OS distributions and underlying infrastructures are abstracted away. 

Networking has emerged as a critical element within the container ecosystem, providing connectivity between containers running on the same host as well as on different hosts, says Michael Letourneau, an IT architect at Liberty Mutual Insurance. "Putting an application into a container automatically drives the need for network connectivity for that container," says Letourneau, whose primary focus is on building and operating Liberty Mutual's container platform. 

To read this article in full, please click here



Network World Security
Feb 26, 2020

Cisco security warnings include firewall holes, Nexus software weaknesses
Cisco has issued another batch of security warnings that include problems in its Firepower firewall (FXOS),  Unified Computing System (UCS) software and Nexus switch operating system (NX-OS) .

Network pros react to new Cisco certification curriculum The firewall and UCS vulnerabilities all have a severity level of "high" on the Common Vulnerability Scoring System and include:

To read this article in full, please click here



Network World Security
Feb 26, 2020

How to fight scripting attacks
Most phishing campaigns use links to malicious scripts that infect users' devices. Here's how to spot and prevent them from doing damage.

Network World Security
Feb 24, 2020

Cisco goes to the cloud with broad enterprise security service
Cisco has unveiled a cloud-based security platform it says will go a long way in helping customers protect their far-flung networked resources.

Cisco describes the new SecureX service as offering  an open, cloud-native system that will let customers detect and remediate threats across Cisco and third-party products from a single interface. IT security teams can then automate and orchestrate security management across enterprise cloud, network and applications and end points.

Network pros react to new Cisco certification curriculum "Until now, security has largely been piecemeal with companies introducing new point products into their environments to address every new threat category that arises," wrote Gee Rittenhouse senior vice president and general manager of Cisco's Security Business Group in a blog about SecureX.

To read this article in full, please click here



Network World Security
Feb 24, 2020

Juniper bolsters wireless security; fights against encrypted malicious threats
Juniper is filling out its enterprise security portfolio this week by integrating support for its Mist wireless customers and adding the capability for customers to gain better visibility and control over encrypted traffic threats.

With the new additions, Juniper is looking to buttress its ability to let users secure all traffic traversing the enterprise network via campus, WAN or data center. The moves are part of Juniper's grand Connected Security platform that includes a variety of security products including its next-generation firewalls that promise to protect networked resources across infrastructure and endpoints.

To read this article in full, please click here



Network World Security
Feb 19, 2020

How to prevent data loss on your network
Use these tools and techniques to protect important data from being exfiltrated from your Windows network.

Network World Security
Feb 18, 2020

Complying with CCPA: Answers to common questions
Enforcement of the California Consumer Privacy Act begins this summer, but lawsuits are already being filed. To help you comply and avoid being sued, CSO contributor Maria Korolov joins IDG TECH(talk) host Juliet Beauchamp to discuss critical components of the CCPA and answer viewers' questions.

Network World Security
Feb 18, 2020

5 Hot network-automation startups to watch
With the combined challenges of tight IT budgets and scarcer technical talent, it's becoming imperative for enterprise network pros to embrace automation of processes and the way infrastructure responds to changing network traffic.

Not only can automation help address these problems, they can also improve overall application-response time by anticipating and addressing looming congestion. Modern applications, such as virtual reality and artificial intelligence, and architectures that incorporate IoT and hybrid cloud have yet to reach their true potential because network capacity seems to always lag behind demand.  

A common problem is that too much networking infrastructure is still manually maintained and managed, but major vendors are starting to addressing these  issues, as are startups that seek to break bottlenecks through automation.

To read this article in full, please click here



Network World Security
Feb 12, 2020

How cyber attackers hide malware on your network
Knowing where to look for malware lurking on your network gives you a better chance to prevent damage from it.

Network World Security
Feb 11, 2020

What's the difference between the deep web and the dark web?
We hear the terms "deep web" and "dark web" thrown around a lot... but what do they actually mean? And what's the difference between the two? CSO Online writer J.M. Porup joins Juliet to dispel rumors and discuss what sets the deep web and dark web apart from the rest of the web.

Network World Security
Feb 11, 2020

Release the monkey! How Infection Monkey tests network security
This free, open source penetration testing tool uses real attacks and real techniques to try and exploit its way into a network.

Network World Security
Feb 10, 2020

Who should lead the push for IoT security?
The ease with which internet of things devices can be compromised, coupled with the potentially extreme consequences of breaches, have prompted action from legislatures and regulators, but what group is best to decide?

Both the makers of IoT devices and governments are aware of the security issues, but so far they haven't come up with standardized ways to address them.

[Get regularly scheduled insights by signing up for Network World newsletters.] "The challenge of this market is that it's moving so fast that no regulation is going to be able to keep pace with the devices that are being connected," said Forrester vice president and research director Merritt Maxim. "Regulations that are definitive are easy to enforce and helpful, but they'll quickly become outdated."

To read this article in full, please click here



Network World Security
Feb 10, 2020

5 firewall features IT pros should know about but probably don't
Firewalls continuously evolve to remain a staple of network security by incorporating functionality of standalone devices, embracing network-architecture changes, and integrating outside data sources to add intelligence to the decisions they make - a daunting wealth of possibilities that is difficult to keep track of.

Because of this richness of features, next-generation firewalls are difficult to master fully, and important capabilities sometimes can be, and in practice are, overlooked.

Here is a shortlist of new features IT pros should be aware of.

To read this article in full, please click here



Network World Security
Feb 06, 2020

Next-generation endpoint security goes beyond the endpoint
AI and behavioral analysis are key to elevating the level of security for devices and back-end systems and are a prerequisite for IoT devices and services. Is your vendor moving in the right direction?

Network World Security
Feb 05, 2020

Cisco patches a security glitch affecting routers, switches and phones
Cisco has issued fixes for five security glitches that can be found in a wealth of its networked enterprise products - from switches and routers to web cameras and desktop VoIP phones.  

The problems center around vulnerabilities in the implementation of the Cisco Discovery Protocol (CDP) that could let remote attackers take over the products without any user interaction. While no public exploit has been found, an attacker simply needs to send a maliciously crafted CDP packet to a target device located inside the network to take advantage of the weakness, Cisco stated.

Cisco's CDP is a Layer 2 protocol that runs on Cisco devices and enables networking applications to learn about directly connected devices nearby, according to Cisco. It enables management of Cisco devices by discovering networked devices, determining how they are configured, and letting systems using different network-layer protocols learn about each other, according to Cisco.

To read this article in full, please click here



Network World Security
Feb 05, 2020

How to check your vulnerability to credential dumping
Use these techniques to see if attackers have harvested authentication credentials from your Windows network.

Network World Security
Feb 04, 2020

7 best practices for managing a multi-cloud environment
Multi-cloud strategies and hybrid IT environments bring a set of challenges that technology leaders might not have expected.

Network World Security
Feb 04, 2020

The problem with mobile and app voting
It's the day after the 2020 Iowa caucuses, and the Iowa Democratic Party has yet to announce the winner. The app that precinct leaders were supposed to use to report final tallies recorded inconsistent results. Party leaders blamed a "coding issue" within the app, not a hack or attack. Computerworld's Lucas Mearian joins Juliet to discuss the problem with mobile voting and how this snafu may affect the reputation of app voting in the future.

Network World Security
Jan 29, 2020

How to better control access to your Windows network
Take stock of how people and devices access your network and block potential avenues of attack.

Network World Security
Jan 29, 2020

Cisco software fortifies industrial IoT security
Cisco is looking to better protect myriad edge-attached IoT devices with new security software that promises to protect industrial assets in one of the most disparate of network environments.

The company rolled out what it called an overarching security architecture for Industrial IoT (IIoT) environments that includes existing products but also new software called Cisco Cyber Vision, for the automated discovery of industrial assets attached to Cisco's extensive IIoT networking portfolio. 

More about edge networking

To read this article in full, please click here



Network World Security
Jan 29, 2020

IT pros need to weigh in on that ‘sassy' security model
Cloud services that provide both network and security intelligence are gaining popularity because they are easy to consume and they improve agility. Similarly, a model known as SD-Branch is providing network and security functionality at the WAN edge on a single platform.

Both of these trends have contributed to the development by Gartner of a network architecture known as the secure-access service edge or SASE, which "converges network (for example, software-defined WAN) and network security services (such as [secure web gateways], [cloud access security brokers] and firewall as a service)." SASE (pronounced "sassy") would primarily be delivered as a cloud-based service, Gartner says.

To read this article in full, please click here



Network World Security
Jan 28, 2020

Securing the IoT is a nightmare
Currently, we have over 26-billion IoT devices running in our workplaces, offices and homes. If you're looking for an IoT security scorecard, it looks something like this: Security Threats: 26,000,000,000, IoT Secure Devices: 0.

Network World Security
Jan 22, 2020

Cisco issues firewall, SD-WAN security warnings
Amongst Cisco's dump of 27 security advisories today only one was rated as critical - a vulnerability in its Firepower firewall system that could let an attacker bypass authentication and execute arbitrary actions with administrative privileges on a particular device.

The Firepower Management Center (FMC) vulnerability - which was rated at 9.8 out of 10 - comes from improper handling of Lightweight Directory Access Protocol (LDAP) authentication responses from an external authentication server. With it, an attacker could exploit the vulnerability by sending crafted HTTP requests to an affected device and gain administrative access to its web-based management interface.

To read this article in full, please click here



Network World Security
Jan 22, 2020

How to prep for Windows 7, Server 2008 end of life
Still running Windows 7 or Windows Server 2008? Take these steps to minimize your risk.

Network World Security
Jan 20, 2020

Windows Server vulnerability disclosed by NSA; Don't wait to patch
Microsoft's monthly Patch Tuesday included a hefty haul of fixes: 49 total, and one of them is more than just critical. For enterprises running Windows Server 2016 and Server 2019, it's vital you implement the patch ASAP.

The National Security Agency (NSA) disclosed the Windows vulnerability on Tuesday, the same day the fix was issued. That means the NSA found the flaw likely months ago but held off on public notification until Microsoft could come up with a fix. It would be irresponsible for the NSA, or anyone else, to announce a vulnerability and not give the software maker time to patch it.

The vulnerability was spotted in "crypt32.dll," a Windows module that has been in both desktop and server versions since NT 4.0 more than 20 years ago. Microsoft describes the library as handling certificate and cryptographic messaging functions in the CryptoAPI.

To read this article in full, please click here



Network World Security
Jan 16, 2020

Why multicloud security is your next big challenge
Companies deploy an average of three to five different cloud services. With an increased emphasis on security and regulatory compliance, the capability to manage these disparate systems is crucial.

Network World Security
Jan 15, 2020

Review: SaltStack brings SecOps to network orchestration and automation
SaltStack Enterprise, and its optional SecOps modules, is one of the only platforms available today that can fully manage complex enterprise environments while also protecting them.

Network World Security
Jan 15, 2020

3 easy ways to make your Windows network harder to hack
Start the new year off by eliminating common paths for attackers to breach your network.

Network World Security
Jan 13, 2020

How to deal with the impact of digital transformation on networks
Digital transformation has increased the importance of the network, particularly the edge, where customers, employees, cloud applications and IoT devices connect to the enterprise. The legacy static and non-differentiated network edge of years past is no longer sufficient for many reasons, so as companies embark on digital-transformation plans, their networks must evolve.

Networking pros should be looking at, among other things, improving security and embracing software-defined networking (SDN) that supports propagating changes quickly across the network in order to accommodate the many challenges digital transformation creates.

To read this article in full, please click here



Network World Security
Jan 08, 2020

How to fix insecure LDAP binds
Prevent Windows admin credentials from being exposed in cleartext with this tip.

Network World Security
Jan 03, 2020

Cisco issues critical security warnings its Data Center Network Manager
Cisco this week issued software to address multiple critical authentication exposures in its Data Center Network Manager (DCNM) software for its Nexus data center switches.

DCNM is a central management dashboard for data-center fabrics based on Cisco Nexus switches and handles a number of core duties such as automation, configuration control, flow policy management and real-time health details for fabric, devices, and network topology.

To read this article in full, please click here



Network World Security
Jan 02, 2020

How to get maximum protection from MFA in Office 365
Follow these steps to ensure your multi-factor authentication for Office 365 is effective.

Network World Security
Dec 30, 2019

Most popular tech stories of 2019
Insider Pro subscribers pick the Top 10 articles published in our debut year.

Network World Security
Dec 26, 2019

Top tech stories of 2019
The new Apple Card, the battle for cryptocurrency dominance, cybersecurity skills shortage - just a few of the stories that made headlines in 2019. Watch as IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp discuss the top tech stories of the year.

Network World Security
Dec 24, 2019

How to make the most of Microsoft's new Compliance Score Console
This new Microsoft 365 feature can help you stay in compliance with regulations like GDPR and better protect data.

Network World Security
Dec 23, 2019

IDG Contributor Network: Recent VPN hacks reveal transparency issues within the industry and its supply chain
Consumers are no doubt becoming increasingly aware about the safety and security of their online activity after many highly publicized studies have shown an uptick in online data theft. According to the Federal Trade Commission, there were 3 million reports of identity theft alone in 2018.

Even though these threats — and the rash of data breaches — continue to grab headlines, consumers still are connecting to public wifi despite the threats and are joining other unsafe networks while traveling. More cautious or tech-savvy individuals know to turn to virtual private networks (VPNs) as a way to safely connect online, and as VPNs become more mainstream, some project the VPN market can grow to more than $35 billion by 2022. We've even seen some vendors to capitalize by creating flashy TV commercials that insinuate that they are consumers' digital doorman. 

To read this article in full, please click here



Network World Security
Dec 23, 2019

Recent VPN hacks reveal transparency issues within the industry and its supply chain
Consumers are no doubt becoming increasingly aware about the safety and security of their online activity after many highly publicized studies have shown an uptick in online data theft. According to the Federal Trade Commission, there were 3 million reports of identity theft alone in 2018.

Even though these threats — and the rash of data breaches — continue to grab headlines, consumers still are connecting to public wifi despite the threats and are joining other unsafe networks while traveling. More cautious or tech-savvy individuals know to turn to virtual private networks (VPNs) as a way to safely connect online, and as VPNs become more mainstream, some project the VPN market can grow to more than $35 billion by 2022. We've even seen some vendors to capitalize by creating flashy TV commercials that insinuate that they are consumers' digital doorman. 

To read this article in full, please click here



Network World Security
Dec 18, 2019

How to protect the enterprise from holiday attacks
Attackers often take advantage of the holidays to launch attacks. Use these Microsoft settings to deter them.

Network World Security
Dec 16, 2019

IoT security: IT's biggest headache
The internet of things encompasses connected devices on a massive scale, actionable data and innovative business models - and it also brings unprecedented security challenges.

Network World Security
Dec 16, 2019

IoT security: Why it's your biggest nightmare
The internet of things encompasses connected devices on a massive scale, actionable data and innovative business models - and it also brings unprecedented security headaches.

Network World Security
Dec 11, 2019

How to secure your domain name services
Follow these steps to protect your websites at the server and workstation.

Network World Security
Dec 11, 2019

Blockchain/IoT integration accelerates, hits a 'sweet spot'
IoT and blockchain may be a natural fit, but it will still take five to 10 years before kinks are worked out and the two technologies can reach their full potential, according to Gartner.

Network World Security
Dec 11, 2019

Blockchain/IoT integration accelerates, hits a 'sweet spot' for the two technologies
IoT and blockchain may be a natural fit, but it will still take five to 10 years before kinks are worked out and the two technologies can reach their full potential, according to Gartner.

Network World Security
Dec 09, 2019

What's hot for Cisco in 2020
As the industry gets ready to gear up for 2020 things have been a  little disquieting in networking land.

That's because some key players - Arista and Juniper in particular - have been reporting business slowdowns as new deals have been smaller than expected and cloud providers haven't been as free-spending as in the past.

[Get regularly scheduled insights by signing up for Network World newsletters.] Worldwide IT spending has been on the slow side, Gartner said in October that worldwide IT spending is projected to total $3.7 trillion in 2019, an increase of 0.4% from 2018, the lowest growth forecast so far in 2019. The good news: global IT spending is expected to rebound in 2020 with forecast growth of 3.7%, primarily due to enterprise software spending, Gartner stated.

To read this article in full, please click here



Network World Security
Dec 05, 2019

The VPN is dying, long live zero trust
The venerable VPN, which has for decades provided remote workers with a secure tunnel into the enterprise network, is facing extinction as enterprises migrate to a more agile, granular security framework called zero trust, which is better adapted to today's world of digital business.

VPNs are part of a security strategy based on the notion of a network perimeter; trusted employees are on the inside and untrusted employees are on the outside. But that model no longer works in a modern business environment where mobile employees access the network from a variety of inside or outside locations, and where corporate assets reside not behind the walls of an enterprise data center, but in multi-cloud environments.

To read this article in full, please click here



Network World Security
Dec 02, 2019

Welcome to Insider Pro's certifications and training center
Certifications show that you're committed to your job, have specific skills and are willing to up your game. Check out our online training courses and guides to top certifications -- all part of your Insider Pro subscription.

Network World Security
Dec 02, 2019

IT certifications and training center
Certifications show that you're committed to your job, have specific skills and are willing to up your game. Check out our online training courses and guides to top certifications -- all part of your Insider Pro subscription.

Network World Security
Nov 26, 2019

Has the quantum crypto break already happened?
Better quantum algorithms and a strange silence since last year from quantum computing researchers suggest that we are closer to breaking traditional encryption than most people believe.

Network World Security
Nov 20, 2019

IBM aims at hybrid cloud, enterprise security
IBM is taking aim at the challenging concept of securely locking-down company applications and data spread across multiple private and public clouds and on-premises locations.

IBM is addressing this challenge with its Cloud Pak for Security, which features open-source technology for hunting threats, automation capabilities to speed response to cyberattacks, and the ability integrate customers' existing point-product security-system information for better operational safekeeping - all under one roof.

[ Learn how server disaggregation can boost data center efficiency and how Windows Server 2019 embraces hyperconverged data centers . | Get regularly scheduled insights by signing up for Network World newsletters. ] IBM Cloud Paks are bundles of Red Hat's Kubernetes-based OpenShift Container Platform along with Red Hat Linux and a variety of connecting technologies to let enterprise customers deploy and manage containers on their choice of infrastructure, be it private or public clouds, including AWS, Microsoft Azure, Google Cloud Platform, Alibaba and IBM Cloud.

To read this article in full, please click here



Network World Security
Nov 20, 2019

How make a Windows disaster recovery kit
Make your own disaster checklist and recovery toolkit before trouble happens.

Network World Security
Nov 18, 2019

Fortinet CEO: Network and security technologies give rise to security-driven networking
The network and security industries both continue to evolve at a rate never seen before.  Historically, security and network operation teams have worked in parallel with one another, sometimes being at odds with each other's goals.

However, that is changing as businesses rely on their networks to operate. It's fair to say that today, for many companies, the network is the business. As this happens, network and security technologies need to be more closely aligned giving rise to the concept of security-driven networking.

[Get regularly scheduled insights by signing up for Network World newsletters.] In this post, ZK Research had a chance to sit down with the co-founder and CEO of Fortinet Ken Xie to discuss the future of networking and security. 

To read this article in full, please click here



Network World Security
Nov 15, 2019

IoT in 2020: The awkward teenage years
Much of the hyperbole around the Internet of Things isn't really hyperbole anymore - the instrumentation of everything from cars to combine harvesters to factories is just a fact of life these days. IoT's here to stay.

Yet despite the explosive growth - one widely cited prediction from Gartner says that the number of enterprise and automotive IoT endpoints will reach 5.8 billion in 2020 - the IoT market's ability to address its known flaws and complications has progressed at a far more pedestrian pace. That means ongoing security woes and a lack of complete solutions are most of what can be safely predicted for the coming year.

To read this article in full, please click here



Network World Security
Nov 14, 2019

Balancing patient security with healthcare innovation | TECH(talk)
Healthcare organizations are one of the most targeted verticals when it comes to cyberattacks. While those organizations must work to secure patients' sensitive data, it can also be helpful to analyze that data to improve patient outcomes. Jason James, CIO of Net Health, joins Juliet to discuss why attackers target healthcare organizations, Google's Project Nightingale and what it means for a tech giant to have access to the medical data of millions of people.

Network World Security
Nov 13, 2019

Red Hat Responds to Zombieload v2
Three Common Vulnerabilities and Exposures (CVEs) opened yesterday track three flaws in certain Intel processors, which, if exploited, can put sensitive data at risk.

Of the flaws reported, the newly discovered Intel processor flaw is a variant of the Zombieload attack discovered earlier this year and is only known to affect Intel's Cascade Lake chips.

[Get regularly scheduled insights by signing up for Network World newsletters.] Red Hat strongly suggests that all Red Hat systems be updated even if they do not believe their configuration poses a direct threat, and it is providing resources to their customers and to the enterprise IT community.

To read this article in full, please click here



Network World Security
Nov 13, 2019

Get 70% off NordVPN Virtual Private Network Service 3 months free - Deal Alert
Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN has discounted their popular VPN software 70%, with 3 extra months on top. Use our link and see the discount applied when you click "buy now".

Network World Security
Nov 12, 2019

SASE is more than a buzzword for BioIVT
It seems the latest buzzword coming from those analysts at Gartner is SASE (pronounced "sassy"), which stands for "Secure Access Service Edge." Network World has published several articles recently to explain what SASE is (and perhaps isn't). See Matt Conran's The evolution to Secure Access Service Edge (SASE) is being driven by necessity as well as Zeus Kerravala's article How SD-WAN is evolving into Secure Access Service Edge.

To read this article in full, please click here



Network World Security
Nov 07, 2019

How to harden web browsers against cyberattacks
Use these techniques to limit attackers' ability to compromise systems and websites.

Network World Security
Nov 07, 2019

Printers: The overlooked security threat in your enterprise | TECHtalk
Printers, often a forgotten target in the enterprise, are vulnerable to all the usual cyberattacks. Watch as IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp and CSO Online's J.M. Porup discuss the threats to these devices, plus how to secure them and protect your network.

Network World Security
Nov 06, 2019

Cisco Meraki ups security with new switch, software
Cisco Meraki has introduced new hardware and software the company says will help customers more effectively support and secure a wide variety of distributed network resources.

The new products, which include a raft of new security features as well a new class of switches and a cellular gateway will help Meraki address customers who perhaps don't have the IT expertise nor staffing to support the increasing number of devices that need to be managed, said Lawrence Huang, vice president of product management at Cisco Meraki.

Network pros react to new Cisco certification curriculum "Threat vectors are evolving and the way customers need to protect themselves need to evolve as well - how customers support applications and IoT devices exemplify the idea its not just one perimeter that needs protecting but a collection of micorperimenters," Huang said.

To read this article in full, please click here



Network World Security
Nov 05, 2019

Boeing's insecure networks threaten security and safety
Aircraft manufacturer Boeing's insecure networks leave the company--and potentially its aircraft--at risk of exploitation. Security researcher Chris Kubecka uncovered these threats in April, and new reporting by CSO's J.M. Porup reveals little has been done to patch these vulnerabilities. They both join Juliet to discuss how Kubecka discovered this information and what it means for national security and passenger safety.

Network World Security
Nov 05, 2019

Boeing's unsecure networks threaten security and safety
Aircraft manufacturer Boeing's unsecure networks leave the company--and potentially its aircraft--at risk of exploitation. Security researcher Chris Kubecka uncovered these threats in April, and new reporting by CSO's J.M. Porup reveals little has been done to patch these vulnerabilities. They both join Juliet to discuss how Kubecka discovered this information and what it means for national security and passenger safety.

Network World Security
Nov 05, 2019

VMware amps security with in-house, Carbon Black technology
VMware is moving quickly to meld its recently purchased Carbon Black technology across its product lines with an eye toward helping users protect their distributed enterprises.

VMware just closed the $2.1 billion buy of cloud-native endpoint-security vendor Carbon Black in October and in the process created a new security business unit that will target cybersecurity and analytics to protect networked enterprise resources.

More about edge networking

To read this article in full, please click here



Network World Security
Nov 04, 2019

A VPN service that gets around the Great Firewall of China legally
The saying goes that China is the world's factory. For many companies around the world, their products or components of their products are produced in mainland China. At the same time, China's population of more than a billion people makes it one of the world's largest consumer markets. Thus, for either production or sales, many companies want to do business in China and have established facilities there.

On the networking front, this means that multinational companies need to extend their wide area network into China to support their large or rapidly growing operations—and that's easier said than done.

[Get regularly scheduled insights by signing up for Network World newsletters.] Many organizations had done this using VPNs, but in early 2018, the Chinese government placed restrictions on IPsec traffic to basically block it from going in and out of the country. The Ministry of Industry and Information Technology (MIIT) said these restrictions are in accordance with the China Cross-border Data Telecommunications Industry Alliance (CDTIA), which was created to regulate cross-border data communication.

To read this article in full, please click here



Network World Security
Nov 04, 2019

An SD-WAN service that gets around the Great Firewall of China legally
The saying goes that China is the world's factory. For many companies around the world, their products or components of their products are produced in mainland China. At the same time, China's population of more than a billion people makes it one of the world's largest consumer markets. Thus, for either production or sales, many companies want to do business in China and have established facilities there.

On the networking front, this means that multinational companies need to extend their wide area network into China to support their large or rapidly growing operations—and that's easier said than done.

[Get regularly scheduled insights by signing up for Network World newsletters.] Many organizations had done this using VPNs, but in early 2018, the Chinese government placed restrictions on IPsec traffic to basically block it from going in and out of the country. The Ministry of Industry and Information Technology (MIIT) said these restrictions are in accordance with the China Cross-border Data Telecommunications Industry Alliance (CDTIA), which was created to regulate cross-border data communication.

To read this article in full, please click here



Network World Security
Oct 30, 2019

IoT roundup: Carriers expand NB-IoT, Congress eyes IoT security …
A powerful IoT networking technology used by the major carriers continues to gain ground, Congress makes noise about training and a prominent researcher warns of security trouble ahead.

Network World Security
Oct 30, 2019

How to and why you should disable LLMNR with Windows Server
Link-Local Multicast Name Resolution could enable a man-in-the-middle attack, so it's best to disable the protocol when setting up Windows Server 2019.

Network World Security
Oct 28, 2019

How SD-WAN is evolving into Secure Access Service Edge
SASE, pronounced "sassy," stands for secure access service edge, and it's being positioned by Gartner as the next big thing in enterprise networking. The technology category, which Gartner and other network experts first introduced earlier this year, converges the WAN edge and network security into a cloud-based, as-a-service delivery model. According to Gartner, the convergence is driven by customer demands for simplicity, scalability, flexibility, low latency, and pervasive security.

SASE brings together security and networking A SASE implementation requires a comprehensive technology portfolio that only a few vendors can currently deliver. The technology is still in its infancy, with less than 1% adoption. There are a handful of existing SD-WAN providers, including Cato Networks, Juniper, Fortinet and Versa, that are expected to compete in the emerging SASE market. There will be other SD-WAN vendors jumping on this wagon, and the industry is likely to see another wave of startups. 

To read this article in full, please click here



Network World Security
Oct 28, 2019

IoT roundup: Carriers expand NB-IoT footprints, Congress eyes security bill, and 'IT asbestos' looms
The major U.S. mobile carriers are eager participants in the rise of IoT, and it's tough to argue that they don't have a major role to play - the ability to connect largely anywhere, coupled with the ability to handle high-throughput applications, means that cellular data can be an attractive option for the connectivity piece of an IoT deployment.

AT&T announced a deal with Vodafone last week to interconnect their respective narrow-band IoT networks across the Atlantic, mating AT&T's U.S. coverage with Vodafone's in western Europe. That means that businesses with NB-IoT deployments in those areas can use that single network to connect their entire implementation. Not to be outdone, Sprint announced that it, too, is rolling out NB-IoT on its Curiosity IoT platform. Sprint shared its plans during a panel discussion at Mobile World Congress in Los Angeles last week.

To read this article in full, please click here



Network World Security
Oct 28, 2019

IoT roundup: VMware, Nokia beef up their IoT
The major U.S. mobile carriers are eager participants in the rise of IoT, and it's tough to argue that they don't have a major role to play - the ability to connect largely anywhere, coupled with the ability to handle high-throughput applications, means that cellular data can be an attractive option for the connectivity piece of an IoT deployment.

AT&T announced a deal with Vodafone last week to interconnect their respective narrow-band IoT networks across the Atlantic, mating AT&T's U.S. coverage with Vodafone's in western Europe. That means that businesses with NB-IoT deployments in those areas can use that single network to connect their entire implementation. Not to be outdone, Sprint announced that it, too, is rolling out NB-IoT on its Curiosity IoT platform. Sprint shared its plans during a panel discussion at Mobile World Congress in Los Angeles last week.

To read this article in full, please click here



Network World Security
Oct 24, 2019

Gartner crystal ball: Looking beyond 2020 at the top IT-changing technologies
ORLANDO -  Forecasting long-range IT technology trends is a little herding cats - things can get a little crazy.

But Gartner analysts have specialized in looking forwardth, boasting an 80 percent  accuracy rate over the years, Daryl Plummer, distinguished vice president and Gartner Fellow told the IT crowd at this year's IT Symposium/XPO.  Some of those successful prediction have included the rise of automation, robotics, AI technology  and other ongoing trends.

Now see how AI can boost data-center availability and efficiency Like some of the other predictions Gartner has made at this event, this year's package of predictions for 2020 and beyond is heavily weighted toward the human side of technology rather than technology itself. 

To read this article in full, please click here



Network World Security
Oct 23, 2019

How to double-check permissions post migration from Windows 7
It pays to make sure all permissions in your Windows environment are correct after migrating from Windows 7 or Server 2008 R2. Here's how to check.

Network World Security
Oct 22, 2019

Cisco issues critical security warning for IOS XE REST API container
Cisco this week said it issued a software update to address a vulnerability in its Cisco REST API virtual service container for Cisco IOS XE software that scored a critical 10 out of 10 on the Common Vulnerability Scoring System (CVSS) system.

With the vulnerability an attacker could submit malicious HTTP requests to the targeted device and if successful, obtain the token-id of an authenticated user. This token-id could be used to bypass authentication and execute privileged actions through the interface of the REST API virtual service container on the affected Cisco IOS XE device, the company said.

To read this article in full, please click here



Network World Security
Oct 22, 2019

Your best defense against insider threats | TECH(talk)
When employees are your weakest link, companies must have programs in place to prevent them from accidentally or intentionally putting the organization at risk. Watch as TECHtalk hosts Ken Mingis and Juliet Beauchamp discuss various options with CSO's Lucian Constantin.

Network World Security
Oct 21, 2019

Train to be a certified cyber security professional for just $39
Cyber crime is responsible for a staggering amount of damage and chaos around the world. Want to be a part of the solution? Then train for a career in this demanding field with The A to Z Cyber Security and IT Certification Training Bundle.

This e-training bundle is perfect for anyone who has an interest in putting a stop to cyber crime. It includes twelve courses that'll introduce students to ethical hacking methods, show them how to test a network for weaknesses, and identify problems so they can be fixed prior to being exploited. It's fast, flexible, and you can even apply your training in preparation for several certification exams

To read this article in full, please click here



Network World Security
Oct 16, 2019

Microsoft's Windows, Office 365 advice for secure elections
Microsoft has issued guidance and offered resources to help election officials and candidate campaigns to better protect their Windows and Office 365 systems.

Network World Security
Oct 11, 2019

Can microsegmentation help IoT security?
The Internet of Things (IoT) promises some big benefits for organizations, such as greater insights about the performance of corporate assets and finished products, improved manufacturing processes, and better customer services. The nagging security issues related to IoT, unfortunately, remain a huge concern for companies and in some cases might be keeping them from moving forward with initiatives. One possible solution to at least some of the security risks of IoT is microsegmentation, a  concept in networking that experts say could help keep IoT environments under control.

To read this article in full, please click here

(Insider Story)

Network World Security
Oct 10, 2019

VMware builds security unit around Carbon Black tech
VMware has wrapped up its $2.1 billion buy of cloud-native endpoint-security vendor Carbon Black and in the process created a new security business unit that will target cybersecurity and analytics to protect networked enterprise resources.

When VMware announced the acquisition in August, its CEO Pat Gelsinger said he expected Carbon Black technology to be integrated across VMware's product families such as NSX networking software and vSphere, VMware's flagship virtualization platform. "Security is broken and fundamentally customers want a different answer in the security space. We think this move will be an opportunity for major disruption," he said. 

To read this article in full, please click here



Network World Security
Oct 08, 2019

Top enterprise VPN vulnerabilities
Don't assume VPNs are always safe. These popular enterprise VPNs all have known remote code execution vulnerabilities.

Network World Security
Oct 02, 2019

How to safely erase data under Windows
Bitlocker and self-encrypting hard drives can make it easier to erase data so that it cannot be recovered. This is how the "crypto-erase" method works.

Network World Security
Sep 30, 2019

IoT roundup: Security holes abound, GE Digital makes noise and more
This week, we look at IoT security holes -- both usual and unusual -- an IIoT player makes a move, and mergers and partnerships worth noting.

Network World Security
Sep 26, 2019

Cisco: 13 IOS, IOS XE security flaws you should patch now
Cisco this week warned its IOS and IOS XE customers of 13 vulnerabilities in the operating system software they should patch as soon as possible.

All of the vulnerabilities - revealed in the company's semiannual IOS and IOS XE Software Security Advisory Bundle - have a security impact rating (SIR) of "high". Successful exploitation of the vulnerabilities could allow an attacker to gain unauthorized access to, conduct a command injection attack on, or cause a denial of service (DoS) condition on an affected device, Cisco stated. 

"How to determine if Wi-Fi 6 is right for you" Two of the vulnerabilities affect both Cisco IOS Software and Cisco IOS XE Software. Two others affect Cisco IOS Software, and eight of the vulnerabilities affect Cisco IOS XE Software. The final one affects the Cisco IOx application environment. Cisco has confirmed that none of the vulnerabilities affect Cisco IOS XR Software or Cisco NX-OS Software.  Cisco has released software updates that address these problems.

To read this article in full, please click here



Network World Security
Sep 25, 2019

How to move users to the Outlook app with Intune
Microsoft is turning off basic authentication, so it's wise to move mobile users to the Outlook app to better protect them from attackers.

Network World Security
Sep 18, 2019

How to monitor Windows to prevent credential theft attacks
Attackers are now enabling WDigest credential caching to allow them to harvest credentials. Here's how to spot it.

Network World Security
Sep 17, 2019

All about U.S. tech antitrust investigations | TECH(feed)
Four large tech companies -- Apple, Amazon, Google and Facebook are under investigation in the U.S. for allegedly anticompetitive behavior. These antitrust investigations on both the federal and state levels are aimed at uncovering the practices these companies engage in to eliminate competition. In this episode of TECH(feed), Juliet discusses the House investigation into big tech and how Congress plans to investigate potential wrongdoing by these companies.

  • CEOExpress
  • 1 Boston Place | Suite 2600
    Boston MA 02108
  • 617 482 1200
    617 299 8649 (fax)
  • Contact
  • As an Amazon Associate
    CEOExpress earns from
    qualifying purchases.

©1999-2020 CEOExpress Company LLC