Latest from todayNewsCloudflare firewall reacts badly to React exploit mitigationIn attempting to fix one problem, Cloudflare caused another.By Peter SayerDec 5, 20253 minsCloud SecurityNetwork SecuritySecurity Analysis Submarine cable cybersecurity: protecting critical infrastructureBy María Ramos DomínguezDec 4, 20255 minsIndustryNetwork SecuritySecurityFeature How CISOs can prepare for the new era of short-lived TLS certificatesBy Andrada FiscuteanDec 3, 20259 minsData and Information SecurityEncryptionNetwork Security BrandPostSponsored by NETSCOUTNETSCOUT wins “Overall Network Security Solution of the Year”By Robert Derby Dec 1, 20254 minsNetwork SecuritySecurity NewsMicrosoft gives Windows admins a legacy migration headache with WINS sunsetBy John E. Dunn Dec 1, 20256 minsEndpoint ProtectionNetwork AdministratorWindows Security NewsFCC reversal removes federal cyber safeguards targeting telecom weaknesses post-Salt Typhoon attacksBy Taryn Plumb Nov 21, 20255 minsGovernmentLaws and RegulationsTelecommunications Industry OpinionSelling to the CISO: An open letter to the cybersecurity industryBy Tyler Farrar Nov 20, 20256 minsApplication SecurityCSO and CISOTechnology Industry NewsWhatsApp flaw allowed discovery of the 3.5 billion mobile numbers registered to the platformBy John E. Dunn Nov 19, 20255 minsCommunications SecurityMessaging SecurityNetwork Security NewsArista, Palo Alto bolster AI data center security By Michael Cooney Nov 14, 20255 minsNetwork SecuritySecurityZero Trust ArticlesfeatureThe security leaders who turned their frustrations into companiesFormer CISOs share their experience after successfully founding security companies. CSO spoke to Paul Hadjy, Joe Silva, Chris Pierson and Michael Coates.By Jaikumar Vijayan Nov 12, 2025 15 minsCloud SecurityNetwork SecurityThreat and Vulnerability Managementnews analysisEnterprise network security blighted by legacy and unpatched systemsEnd-of-life devices remain a pervasive security concern in the enterprise, as do poorly segmented networks, unpatched systems, and visibility gaps, according to recent telemetry reports. By John Leyden Nov 12, 2025 5 minsNetwork SecuritySecuritynewsCisco fixes critical flaws in Unified Contact Center ExpressVulnerabilities in the contact center solution can result in authentication bypass and remote code execution. The networking company also warned of new attacks on previously patched firewall products.By Lucian Constantin Nov 6, 2025 3 minsNetwork SecurityTechnology IndustryVulnerabilitiesopinionDigital health can’t scale if cybersecurity falls behindThe next pandemic won’t just test our biology — it’ll test whether our AI and cybersecurity can survive the storm.By Rama Devi Drakshpalli Nov 6, 2025 8 minsElectronic Health RecordsHealthcare IndustryNetwork SecuritybrandpostSponsored by NETSCOUTNETSCOUT wins “Overall Network Security Solution of the Year”Recognized for innovation and visibility that transforms threat response.By Robert Derby Dec 1, 2025 4 minsNetwork SecuritySecuritynews analysisHacktivists increasingly target industrial control systems, Canada Cyber Centre warnsOutlining real-world attacks against the water, oil and gas, and agriculture industries, Canada’s Centre for Cyber Security highlights the risks of internet-exposed ICS devices.By Lucian Constantin Nov 3, 2025 4 minsAgriculture IndustryEnergy IndustryMarketsopinionThe unified linkage model: A new lens for understanding cyber riskCyber threats don’t just hit your systems — they move through your connections. The ULM shows how those hidden links fuel real risk.By Henry Sienkiewicz Oct 31, 2025 9 minsAccess ControlCyberattacksZero TrustopinionCybersecurity management for boards: Metrics that matterIf your cyber dashboard looks like a tech manual, you’re flying blind. Real leaders measure resilience, not patch counts.By Maman Ibrahim Oct 30, 2025 7 minsAnalyticsNetwork SecurityROI and MetricsfeatureCAASM and EASM: Top 12 attack surface discovery and management toolsThe main goal of cyber asset attack surface management (CAASM) and external attack surface management (EASM) tools is to protect information about a company’s security measures from attackers. Here are 12 tools to consider when deciding what is best for the business.By Tim Ferrill and David Strom Oct 22, 2025 12 minsData and Information SecurityNetwork SecurityThreat and Vulnerability ManagementfeatureNetwork security devices endanger orgs with ’90s era flawsBuilt to defend enterprise networks, network edge security devices are becoming liabilities, with an alarming rise in zero-day exploits of what experts describe as basic vulnerabilities. Can the security device industry correct course?By Lucian Constantin Oct 20, 2025 12 minsApplication SecurityDevSecOpsTechnology Industrynews analysisForeign hackers breached a US nuclear weapons plant via SharePoint flawsA foreign actor infiltrated the National Nuclear Security Administration’s Kansas City National Security Campus through vulnerabilities in Microsoft’s SharePoint browser-based app, raising questions about the need to solidify further federal IT/OT security protections.By Cynthia Brumfield Oct 20, 2025 8 minsCyberattacksData BreachGovernment ITevents promotion58% of CISOs are boosting AI security budgetsNew research finds that AI-enabled cybersecurity is CISOs' top investment priority for the next 12 months, and it's easy to see why. AI is rapidly changing how security work gets done, from alert triage to prioritizing vulnerabilities and more.By Joan Goodchild for CSO events Oct 15, 2025 3 minsArtificial IntelligenceNetwork SecuritySecurity SoftwarenewsSource code and vulnerability info stolen from F5 NetworksIT and security leaders should install latest patches from the application delivery and security vendor after suspected nation-state hack.By Howard Solomon Oct 15, 2025 7 minsNetwork SecuritySecurityVulnerabilities Show more Show less View all Resources whitepaper Zscaler ThreatLabz 2025 VPN Risk Report with Cybersecurity Insiders Learn how Zscaler enables enterprises to secure the hybrid workforce, replace legacy assets like VPN, and deliver zero trust access to private applications. The post Zscaler ThreatLabz 2025 VPN Risk Report with Cybersecurity Insiders appeared first on Whitepaper Repository –. By Zscaler 24 Nov 2025Cloud SecurityNetwork SecuritySecurity whitepaper From the C-Suite to the SOC: Consolidating the Network Security Solutions By ExtraHop Networks Inc 12 Nov 2025Cloud SecurityNetwork SecuritySecurity whitepaper How to Embrace Advanced Encryption Without Introducing Risk By ExtraHop Networks Inc 12 Nov 2025EncryptionNetwork SecuritySecurity View all Podcasts podcastsSponsored by CiscoSecure Remote Working: what we’ve learnt and where we go from hereSecure Remote Working is a podcast series looking at how organizations have had to adapt during the COVID19 pandemic; the challenges they faced, the solutions they found, and the long-term impact of secure remote working at scale. This series outlines how the threat landscape changed, the cultural and leadership impacts, and the key technologies that have enabled organizations to continue to operate in difficult circumstances.3 episodesNetwork Security Ep. 01 Episode 1: Preparing for the next phase in secure remote working Jun 20, 202332 mins Security Ep. 03 Episode 3: Guiding CISOs through change planning for the new way of working Jun 20, 202326 mins Security Video on demand video What is zero trust security? Beyond firewalls and perimeter security, a zero trust architecture allows security officials to better protect data and system access to both outsider and insider threats, adopting a mantra of “trust no one”. We explain the concept in this video. Sep 6, 2023 3 minsAccess ControlNetwork SecurityZero Trust Get up to speed on SASE: What’s driving demand and how providers’ capabilities differ Oct 15, 2021 26 mins Network SecuritySecurity WAN evolution: From SD-WAN to Secure Access Service Edge (SASE) Jun 25, 2021 31 mins Network SecuritySD-WAN How have network firewalls evolved? Apr 30, 2018 FirewallsNetwork MonitoringNetwork Security See all videos Explore a topicApplication SecurityBusiness ContinuityBusiness OperationsCareersCloud SecurityComplianceCritical InfrastructureCybercrimeIdentity and Access ManagementIndustryIT LeadershipPhysical SecurityPrivacyRisk ManagementView all topics Show me morePopularArticlesPodcastsVideos how-to How to justify your security investments By Chritstoph SchuhwerkDec 11, 20256 mins C-SuiteCSO and CISOIT Leadership news Fortinet admins urged to update software to close FortiCloud SSO holes By Howard SolomonDec 10, 20254 mins Access ControlIdentity and Access ManagementSingle Sign-on news Making cybercrime illegal won't stop it; making cybersec research legal may By Maxwell CooterDec 10, 20255 mins CybercrimeGovernmentIndustry podcast CISO Reality: Record Pay, Rising Pressure, and Retention Risk By Joan GoodchildDec 10, 202527 mins CSO and CISOSecurity Infrastructure podcast Inside Visa’s Cyber Defense: CISO Subra Kumaraswamy on blending AI and Human Defense By Joan GoodchildDec 3, 202527 mins Artificial IntelligenceCSO and CISOPhishing podcast The Future of Cybersecurity Leadership: AI, Governance & Education | Kevin Powers, Boston College Nov 19, 202523 mins CyberattacksCybercrimeRisk Management video CISO Reality: Record Pay, Rising Pressure, and Retention Risk By Joan GoodchildDec 10, 202527 mins CSO and CISOSecurity Infrastructure video Inside Visa’s Cyber Defense: CISO Subra Kumaraswamy on blending AI and Human Defense By Joan GoodchildDec 3, 202527 mins Artificial IntelligenceCSO and CISOPhishing video The Future of Cybersecurity Leadership: AI, Governance & Education | Kevin Powers, Boston College Nov 19, 202523 mins CyberattacksCybercrimeRisk Management