Weak passwords are still allowing attackers into networks


A new study from Specops Software finds that 88 percent of passwords used in successful attacks consisted of 12 characters or less, with the most common being just eight characters (24 percent).
The research, largely compiled through analysis of 800 million breached passwords, finds the most common base terms used in passwords are depressingly familiar: 'password', 'admin', 'welcome' and 'p@ssw0rd'.
The challenges of network detection and response


Even as we've seen a shift towards remote working, networks remain the part of an organization that are most at risk from cyber attacks.
In a new infographic LiveAction looks at evolving network security challenges and how the right Network Detection and Response (NDR) solution can be used to tackle them.
Striking the right balance between development and security [Q&A]


Developers need access to many devices and internal services in order to build software. But many of these devices and services are exposed to the public web, creating gaps in security.
Add in the challenges of securing remote working and it's clear that there's a tricky balancing act needed to enable development while keeping the organization secure. We spoke to Avery Pennarun, CEO and co-founder of VPN service Tailscale, to find out how this can be achieved.
Lookout launches unified security for endpoints and cloud


The switch to remote and hybrid working has led to more people working from mobile devices and using cloud platforms.
This needs a security solution that 'follows' and protects corporate data wherever it flows or resides, and with the launch of its new Cloud Security Platform, Lookout does just that.
If you don't know what you're exposing, how can you protect it? [Q&A]


The move to the cloud has meant the days of external exposure being defined by the set of IP ranges in your firewall are gone. Today's attack surface is made up of many internet-facing assets with exposure being controlled at the domain level.
This means web applications have fast become an attractive target for attackers, particularly unknown and forgotten assets -- which are plentiful in modern environments. So how can businesses defend themselves?
The 10 biggest internet outages of 2022


For the last decade the Downdetector site has been providing data on the real-time status and outages of online services.
Ookla, the company behind Downdetector, has released information on the largest outages seen in 2022. While nothing surpassed the biggest outage ever seen, experienced by Meta on October 4, 2021, there have been some significant ones this year.
Keeping attackers out of the 'atomized network' [Q&A]


As the network as we know it has changed and adversaries are finding success with new attack routes that exploit gaps in defenses.
As enterprise security undergoes a major shift we need to change the way we think about this complex 'atomized network'. We spoke to Martin Roesch, CEO of Netography, to find out about the challenges this presents and how to address them.
Ensuring compliance through network automation [Q&A]


Cyber threats are on the rise across every industry and business size, highlighting the importance of maintaining network compliance for organizations and especially for IT and security teams.
But that's easier said than done, with many industry-specific compliance regulations like the Health Insurance Portability and Accountability Act (HIPAA) or the Payment Card Industry Data Security Standard (PCI) each with their own set of standards and processes.
It is bigger and it is cleverer -- Firewalla Gold Plus [Review]


Two years ago when we reviewed the Firewalla Blue we remarked on how tiny it was relative to the level of protection it offers.
The recently launched Gold Plus version is a much bigger and more serious piece of kit aimed at small businesses and professional home users. It offers the same simple, plug-in protection as the Blue but can be used in a number of other ways too.
Get 'Networking All-in-One For Dummies, 8th Edition' ($30 value) FREE for a limited time


Designed to replace that groaning shelf-load of dull networking books you’d otherwise have to buy and house, Networking All-in-One For Dummies covers all the basic and not-so-basic information you need to get a network up and running. It also helps you keep it running as it grows more complicated, develops bugs, and encounters all the fun sorts of trouble you expect from a complex system.
Ideal both as a starter for newbie administrators and as a handy quick reference for pros, this book is built for speed, allowing you to get past all the basics -- like installing and configuring hardware and software, planning your network design, and managing cloud services -- so you can get on with what your network is actually intended to do.
Staying ahead of the hackers with zero trust [Q&A]


With the decline of the traditional enterprise network perimeter, more and more organizations are turning to a zero trust approach to securing their systems.
This not only reduces the attack surface, it ensures that if an attack does succeed it's much less likely to spread laterally within the network. We talked to Tim Silverline, VP of security at network automation specialist Gluware, to find out more about what implementing zero trust means.
Why anomalies in network traffic are key to cybersecurity [Q&A]


Major cyberattacks invariably make the headlines, but it seems that rather than take a proactive approach, many CISOs wait for a new threat to emerge before protecting their business. They simply hope they won't be caught up in the first wave of a new attack.
Dave Mitchell, CTO of cybersecurity investigation specialist HYAS Infosec, believes there is a better approach, one that detects threats by monitoring the communications that form the foundations of internet architecture. We recently talked to him to learn more.
How endpoint security and management are consolidating [Q&A]


Securing endpoints used to be a simple matter of installing a firewall and antivirus solution and then keeping them updated.
But as threats have become more sophisticated, networks more complex and working patterns have shifted away from the office, securing and managing endpoints has become a much greater problem for enterprises.
Almost half of organizations suffer voice network attacks


A new survey shows that 47 percent of organizations have experienced a vishing (voice phishing) or social engineering attack via their voice networks in the past year.
The study by voice traffic protection specialist Mutare also finds most are unaware of the volume of unwanted phone calls traversing their network, or the significance of threats lurking in unwanted traffic, which includes robocalls, spoof calls, scam calls, spam calls, spam storms, vishing, smishing and social engineering.
Overview of network operations is crucial for IT teams


A unified view of network operations is essential for IT teams that want to improve the digital customer experience while boosting their overall productivity, according to a new study.
A new survey for Riverbed, conducted by IDC, reveals that 90 percent of respondents currently use observability tools, yet 60 percent of them believe those tools are too narrowly focused and fail to provide a complete and unified view of their organization's operating conditions.
Recent Headlines
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
Regional iGaming Content
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.