The Hacker News Logo
Click to Subscribe

The Hacker News — Latest Cyber Security News: network security tool

Cynet Review: Simplify Security with a True Security Platform

Cynet Review: Simplify Security with a True Security Platform

November 13, 2018Mohit Kumar
In 1999, Bruce Schneier wrote, "Complexity is the worst enemy of security." That was 19 years ago (!) and since then, cyber se...
A New Paradigm For Cyber Threat Hunting

A New Paradigm For Cyber Threat Hunting

June 11, 2018Mohit Kumar
It’s no secret that expecting security controls to block every infection vector is unrealistic. For most organizations, the chances are v...
Critical flaw leaves thousands of Cisco Switches vulnerable to remote hacking

Critical flaw leaves thousands of Cisco Switches vulnerable to remote hacking

April 04, 2018Swati Khandelwal
Security researchers at Embedi have disclosed a critical vulnerability in Cisco IOS Software and Cisco IOS XE Software that could allow a...
IPS as a Service Blocks WannaCry Spread Across the WAN

IPS as a Service Blocks WannaCry Spread Across the WAN

August 14, 2017Mohit Kumar
One of the most devastating aspects of the recent WannaCry ransomware attack was its self-propagating capability exploiting a vulnerabili...
What is the hype around Firewall as a Service?

What is the hype around Firewall as a Service?

July 10, 2017Mohit Kumar
Admit it. Who would not want their firewall maintenance grunt work to go away? For more than 20 years, companies either managed their e...
Hands-On Review: Converged Networking and Security with Cato Networks

Hands-On Review: Converged Networking and Security with Cato Networks

May 08, 2017Mohit Kumar
Nobody likes to do router and firewall management. It often requires a lot of hard labor just keeping the infrastructure up and running. ...
Simplifying SSH keys and SSL Certs Management across the Enterprise using Key Manager Plus

Simplifying SSH keys and SSL Certs Management across the Enterprise using Key Manager Plus

November 02, 2016Swati Khandelwal
With rapidly growing web-based services and widely expanding locations, organizations are using more and more SSL certificates as well as...
Challenge! WIN $50,000 for Finding Non-traditional Ways to Detect Vulnerable IoT Devices

Challenge! WIN $50,000 for Finding Non-traditional Ways to Detect Vulnerable IoT Devices

October 10, 2016Mohit Kumar
If you are concerned about the insecurity of Internet of Things, have good hands at programming and know how to hack smart devices, then ...
Exclusive Deals

Stay Informed — Newsletter Sign Up

Sign up for THN newsletter and get our latest stories delivered straight to your inbox.