network

CIOs Sound Alarm on Network Security in AI Era
The increasing integration of AI and bandwidth-heavy applications is complicating network environments and making them a greater focus for C-suite leaders, according to a report by Extreme Networks ...
Security Boulevard

Overcoming the Challenges of Zero-Trust
Zero-trust, rooted in the principle of "never trust, always verify," requires organizations to assume that every access request, whether internal or external, is potentially harmful ...
Security Boulevard

Is the “Network” Defendable?
Is the network defendable? This serious question is often conveniently left unasked because the answer is uncomfortable. On June 3, 1983, the day before I graduated from high school, MGM released the ...
Security Boulevard
Lack of Network Segmentation in Cybersecurity
Joao Correia | | Article Series, Cybersecurity, network, Network Segmentation in Cybersecurity, Top top 10 cybersecurity misconfigurations
This article is part of a series where we look at a recent NSA/CISA Joint Cybersecurity Advisory on the top cybersecurity issues identified during red/blue team exercises operated by these organizations. In ...

SaaS Attacks: Compromising an Organization without Touching the Network
Tom Eston | | Attack Framework, attacker, blue team, Cloud, Cloud Penetration Testing, cloud-based, Compromise, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, hacker, Hacking, Information Security, Infosec, lateral movement, Luke Jennings, MITRE ATT&CK, MITRE ATT&CK Framework, network, network attacks, Network penetration testing, Podcast, Podcasts, Privacy, Push Security, Red Team, SaaS, SaaS Application, SaaS Attacks, security, Software-as-a-Service, Special Editions, technology, Weekly Edition
In this episode Luke Jennings VP of Research & Development from Push Security joins us to discuss SaaS attacks and how its possible to compromise an organization without touching a single endpoint ...

SDP: The Paradigm Shift in Network Security You Can’t Ignore
In its heyday, the virtual private network (VPN) commanded immense respect as a groundbreaking leap forward in IT security, establishing an invincible perimeter for protecting confidential data. But that was almost 30 ...
Security Boulevard

Detecting and Responding to a Data Breach
SencodeTeam | | Cyber awareness, Cyber Security, cyberattack, cybercrime, Cybersecurity, Data breach, Data breaches, data protection, GDPR, Hacking, Infosec, network, Privacy
In this comprehensive blog, we explore the cybercriminal's mindset, the techniques they employ, and the devastating effects of a data breach. More importantly, we provide strategic insights into how to identify and ...

The Essential Guide to Securing Hybrid Workplace Environments
From here on out, hybrid and remote work are here to stay. Unfortunately, this seismic shift in the way we work has expanded the attack surface for opportunistic cybercriminals. Mimecast’s 2022 state ...
Security Boulevard

Discovering Network Traffic Anomalies to Identify Threats
It’s no secret; by nearly any metric available, cybercrime has grown at an alarmingly fast rate in recent years. As a result, organizations are desperate to implement new cybersecurity measures that increase ...
Security Boulevard
IT admin admits sabotaging ex-employer’s network in bid for higher salary
Graham Cluley | | Administrative Privileges, cybercrime, Featured Articles, Insider, insider threat, IT Security and Data Protection, network, system administrators
A 40-year-old man could face up to 10 years in prison, after admitting in a US District Court to sabotaging his former employer’s computer systems. Casey K Umetsu, of Honolulu, Hawaii, has ...