Networks

The latest technologies and best practices to secure local, virtual, cloud, and hybrid networks.

  • The Pros and Cons of Opal Compliant Drives

      Full-disk encryption (FDE) used to be a software-only proprietary solution. But over the past couple of years, a hardware based hard drive standard has emerged in the form of Opal Security Subsystem Class, or just Opal for short. Developed by the Trusted Computing Group (TCG), a not-for-profit international standards organization, Opal is used for…


  • Password Roulette: Betting on Password Storage Apps

    Call Ondrej Krehel the poster boy for the password problem that is confronting all of us. Password protection on corporate servers is proving to be dangerously porous — think Sony, Citigroup, even RSA Security — and that ups the pressure on every user to use a unique password with each website and Web service. That…


  • How to Wipe a Computer Clean

      Before you sell or get rid of your computers—whether working or not—you should clean them of sensitive documents and data. To be completely safe, you should do this even if you plan on keeping them around in your garage or a closet. You never know who will get their hands on your old computers.…


  • SANS Lists Top 20 Critical Vulnerabilities

    Critical software vulnerabilities are increasing being found — not in the operating system — but in applications and major databases. The information comes out of a new quarterly report, the Top 20 Internet Security Vulnerabilitiesfrom the SANS Institute, a major source of security training and certification based in Bethesda, Md. Analysts from SANS had been…


Top Cybersecurity Companies

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis