Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Top tips: Making the switch to a passwordless future

Top tips is a weekly column where we highlight what’s trending in the tech world today and list ways to explore these trends. This week, we’re exploring how passwordless authentication is becoming the new standard for secure, seamless access. For decades, passwords have been the cornerstone of digital authentication. But in today's cyberthreat landscape, this is no longer enough.

Top DNS resolver security threats you can't ignore in 2025: Expert guide and prevention tips

DNS is often referred to as the internet’s phonebook, translating human-readable domain names into IP addresses. But this essential service also makes DNS a prime target for cyberattackers. With the increasing volume and sophistication of DNS-based threats, including DNS spoofing, cache poisoning, and DDoS attacks, it’s crucial to understand the risks involved.

ARP spoofing explained: How attackers exploit the Address Resolution Protocol

Imagine handing over your house keys to someone who looked trustworthy - only to discover later they were an impostor. Everything that entered or left your home was compromised, and you never saw it coming. That’s what happens in your network when ARP spoofing strikes. The Address Resolution Protocol (ARP) helps devices find each other on a local network by matching IP addresses to MAC addresses.

Automate student account management and secure logins

Every new term comes with its own flavor of IT madness, whether you're managing 500 students or 50,000. From last-minute enrollment surges and forgotten passwords to stale accounts that should've been deprovisioned months ago, IT teams in schools, colleges, and universities know the drill. And yet, many educational institutions are still relying on manual provisioning, PowerShell scripts, and spreadsheets to get through it. If you’re nodding along, this is your cue to start automating.

Bridging network identity and endpoint intelligence: DDI Central now integrates with Endpoint Central

In today’s hybrid networks, an IP address is more than a connection point—it’s a digital identity. But for most admins, that identity is still surface-deep. Traditionally, IPAM tools show you which IP addresses are in use, who’s using them, and what vendor the device belongs to. But they don’t tell you whether that device is secure. That changes now. What if every IP handed out by your DHCP server revealed not just what the device is—but how vulnerable it might be?

Master CIS Benchmark compliance: Simplify network security with automation

As a network admin, balancing optimized configurations with compliance requirements often feels like managing competing priorities. With networks growing more complex every day, achieving and sustaining compliance with the Center for Internet Security (CIS) Benchmarks can feel like a constant uphill battle. However, it doesn't have to be an overwhelming burden. The CIS Benchmarks offer practical, best practice guidelines for securing devices, systems, and applications against evolving threats.

The Change Healthcare hack wasn't just a breach-it was a wake-up call

"The US healthcare system is broken" is not an uncommon phrase. With no universal healthcare coverage, administrative inefficiencies, and an under-resourced primary care system, it's so bad that falling ill could very well bankrupt a citizen.

Top tips: How to turn dark web alerts into your 1st line of defense

Top tips is a weekly column where we highlight what’s trending in the tech world and list ways to explore these trends. This week, we focus on how businesses can turn dark web alerts into their first line of defense against emerging cyberthreats. After hearing about a burglary in your neighborhood, you might install a security camera. You double-check your house locks when you hear about thefts nearby.

Top tips: Managing the risks of BYOAI at work

Top tips is a weekly column where we highlight what’s trending in the tech world today and list ways to explore these trends. This week, we’re discussing the rise of AI tools in the workplace—and the growing risks around their unregulated use. It started quietly. A few employees using ChatGPT to rewrite emails. A project manager testing Notion AI to summarize meetings. A developer relying on GitHub Copilot to speed up code. Now?

The best network vulnerability scanning tool in 2025

Cyberthreats are evolving, and unpatched vulnerabilities remain one of the biggest security risks for organizations. According to IBM’s 2024 Cost of a Data Breach Report, organizations that fail to patch known vulnerabilities face an average loss of $4.45 million per incident. Cybercriminals actively exploit outdated firmware and misconfigurations in network devices, making network vulnerability scanners an essential security tool.