Network security
With the growth of malware and data breaches, enterprises must ensure their networks -- and the applications and traffic on those networks -- are secure. Learn about important network security strategies and technologies, such as VPNs, Secure Access Service Edge (SASE), zero trust and software-defined perimeter (SDP).
Top Stories
-
Tutorial
21 Nov 2024
How to test firewall rules with Nmap
Using Nmap to identify potential shortfalls in the rules used to govern firewall performance gives teams an easy and cost-effective way to plug holes in their security frameworks. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
Tip
18 Nov 2024
What CISOs need to know to build an OT cybersecurity program
More companies are tasking CISOs with operational technology security. But this oversight means a new strategy for those unfamiliar with building an effective OT security program. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
- Sharon Shea, Executive Editor
-
Definition
06 Oct 2022
filter (computing)
The term filter in computing can mean a variety of things, depending on the technology or technical discipline in question. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Definition
05 Oct 2022
network security
Network security encompasses all the steps taken to protect the integrity of a computer network and the data within it. Continue Reading
By- Nick Barney, Technology Writer
- Ben Lutkevich, Site Editor
-
Tip
04 Oct 2022
How to build a zero-trust network in 4 steps
While network teams are responsible for deploying the elements of a zero-trust network, security teams should also be involved in developing the overall zero-trust framework. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Tip
04 Oct 2022
Top zero-trust use cases in the enterprise
Still hesitating to adopt zero trust? Learn about the main zero-trust use cases, as well as its benefits, myths and trends that are beginning to emerge. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Definition
29 Sep 2022
software-defined perimeter (SDP)
A software-defined perimeter, or SDP, is a security technique that controls access to resources based on identity and forms a virtual boundary around networked resources. Continue Reading
By- Sharon Shea, Executive Editor
-
Tip
29 Sep 2022
The 5 principles of zero-trust security
Zero trust is a journey, not a destination. Ensure your corporate network is safe from internal and external threats by implementing these five principles of zero-trust security. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Tip
28 Sep 2022
Why zero trust requires microsegmentation
Microsegmentation is a key security technique that enables organizations to achieve a zero-trust model and helps ensure the security of workloads regardless of where they are located. Continue Reading
By- Andrew Froehlich, West Gate Networks
- Sharon Shea, Executive Editor
-
Definition
28 Sep 2022
microsegmentation
Microsegmentation is a security technique that splits a network into definable zones and uses policies to dictate how data and applications within those zones can be accessed and controlled. Continue Reading
By- Chuck Moozakis, Editor at Large
- Laura Fitzgibbons
-
Tip
27 Sep 2022
How to get into cybersecurity with no experience
Cybersecurity needs new talent now more than ever, but landing that first job without a computer science degree can still be difficult. Here are five tips for getting in the door. Continue Reading
By- Ashwin Krishnan, StandOutin90Sec
-
Definition
23 Sep 2022
Google dork query
A Google dork query, sometimes just referred to as a dork, is a search string or custom query that uses advanced search operators to find information not readily available on a website. Continue Reading
-
Opinion
21 Sep 2022
Planning the journey from SD-WAN to SASE
Enterprises need integrated security and networking frameworks to manage distributed IT environments and are looking to SD-WAN and security options like SASE to get the job done. Continue Reading
By- Bob Laliberte, Former Principal Analyst
-
Enterprise Strategy Group
We provide market insights, research and advisory, and technical validations for tech buyers.
-
Answer
20 Sep 2022
How DKIM records reduce email spoofing, phishing and spam
Learn how implementing DomainKeys Identified Mail helps protect against phishing, spam and email forgery by digitally signing outgoing messages. Continue Reading
By- Peter Loshin, Former Senior Technology Editor
-
Tutorial
01 Sep 2022
How to create and add an SPF record for email authentication
Learn how to create Sender Policy Framework records to list authenticated mail servers for an email domain to fight spam, phishing, email forgery and other malicious email. Continue Reading
By- Peter Loshin, Former Senior Technology Editor
-
News
31 Aug 2022
VMware CEO reveals big changes amid multi-cloud shift
VMware plans to change products, strategic direction and marketing to keep up with customers rushing to deploy multi-cloud architectures. Continue Reading
By- Antone Gonsalves, News Director
-
Tip
23 Aug 2022
7 guidelines to secure network storage
These practices, including firmware and VPN guidance, protect NAS devices. Use these steps as standalone procedures or incorporate them into your overall security process. Continue Reading
By- Julia Borgini, Spacebarpress Media
-
Definition
12 Aug 2022
segregation of duties (SoD)
Segregation of duties (SoD) is an internal control designed to prevent error and fraud by ensuring that at least two individuals are responsible for the separate parts of any task. Continue Reading
By -
Tip
29 Jul 2022
SSH key management best practices and implementation tips
SSH connects key systems and the people and processes necessary to keep them functioning. Learn how to use SSH key management best practices to protect your systems and network. Continue Reading
By- Peter Loshin, Former Senior Technology Editor
-
Tip
28 Jul 2022
How to prevent a data breach: 10 best practices and tactics
When it comes to data breach prevention, the stakes are high. While it's impossible to eliminate the risk, organizations can minimize it by following these best practices. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Tip
27 Jul 2022
SSH2 vs. SSH1 and why SSH versions still matter
The Secure Shell protocol, SSH, was redesigned and released as SSH2 in 2006. While SSH1 lingers for legacy uses, find out how the protocols differ and why it's important. Continue Reading
By- Peter Loshin, Former Senior Technology Editor
- Mike Chapple, University of Notre Dame
-
News
12 Jul 2022
Counterfeit scheme trafficked in $1 billion in Cisco gear
A Florida man has been charged with running a counterfeit operation that duped hospitals, schools, government agencies and the military. Continue Reading
By- Madelaine Millar, TechTarget
-
Tutorial
11 Jul 2022
How to use SSH tunnels to cross network boundaries
The Secure Shell protocol authenticates and encrypts network connections. Find out how it's used to build tunnels while crossing private networks and even firewalls. Continue Reading
By- Peter Loshin, Former Senior Technology Editor
-
Tutorial
23 Jun 2022
Use ssh-keygen to create SSH key pairs and more
Learn how to use ssh-keygen to create new key pairs, copy host keys, use a single login key pair for multiple hosts, retrieve key fingerprints and more in this tutorial. Continue Reading
By- Peter Loshin, Former Senior Technology Editor
-
Opinion
22 Jun 2022
What's driving converged endpoint management and security?
Security and IT teams face challenges in managing and securing a growing number of endpoints, which is driving organizations to look for converged capabilities, according to ESG. Continue Reading
By- Mark Bowker, Senior Analyst
-
News
20 Jun 2022
Cisco customers eager for Meraki's Catalyst management
IT professionals were excited to see cloud-based Meraki management for Catalyst switches but were less enthusiastic over the new Cisco Security Cloud. Continue Reading
By- Madelaine Millar, TechTarget
- Antone Gonsalves, News Director
-
Tip
15 Jun 2022
How to evaluate security service edge products
As organizations become more cloud-centric and adapt to remote work, a new technique known as security service edge is gaining traction. Continue Reading
By- Ed Moyle, Drake Software
-
Feature
07 Jun 2022
Using SSH tunneling for good and evil
Secure Shell tunneling takes the secure application protocol to the next level for bypassing firewalls and creating secure connections everywhere. Continue Reading
By- Peter Loshin, Former Senior Technology Editor
-
Tip
01 Jun 2022
How zero trust unifies network virtualization
The combination of zero trust and network virtualization creates opportunities to strengthen security policies, increase cross-domain collaboration and improve overall visibility. Continue Reading
By- John Burke, Nemertes Research
-
Definition
10 May 2022
Top 10 spyware threats
The top 10 spyware list describes the 10 common spyware threats behind famous spyware attacks and is frequently identified by Webroot's Spy Audit, a free spyware scanner tool. Continue Reading
By -
Definition
09 May 2022
parameter tampering
Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's authorization. Continue Reading
By -
Definition
04 May 2022
SYN flood attack
A SYN flood attack is a type of denial-of-service (DoS) attack on a computer server. Continue Reading
By- Ben Lutkevich, Site Editor
-
Definition
28 Apr 2022
Sender Policy Framework (SPF)
Sender Policy Framework (SPF) is a protocol designed to restrict who can use an organization's domain as the source of an email message. Continue Reading
By- Peter Loshin, Former Senior Technology Editor
-
Answer
25 Apr 2022
What are the benefits and challenges of microsegmentation?
Administrators are assessing microsegmentation to beef up access control and security. But deploying microsegmentation can be complex. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Answer
21 Apr 2022
Comparing network segmentation vs. microsegmentation
Network segmentation and microsegmentation both control access but vary in how they do it, as well as how granular their approach is. Learn the differences here. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Definition
21 Apr 2022
security information management (SIM)
Security information management (SIM) is the practice of collecting, monitoring and analyzing security-related data from computer logs and various other data sources. Continue Reading
By -
Tip
11 Apr 2022
Zero trust, wireless WAN affect the future of IoT networking
Zero-trust security models, wireless WAN evolution and the emergence of pop-up businesses are all helping to fuel innovation in IoT networking capabilities. Continue Reading
By- John Burke, Nemertes Research
-
News
08 Apr 2022
Fortinet, Cato Networks add security for distributed SD-WANs
Fortinet updated FortiOS with an inline sandbox and a cloud access security broker. Cato has added new network access controls to its SASE service. Continue Reading
By- Madelaine Millar, TechTarget
-
Tip
01 Apr 2022
The pros and cons of Netskope SASE
Netskope is undoubtedly a leader in the CASB market, but its limited security capabilities and lack of SD-WAN make Netskope an incomplete SASE offering. Continue Reading
By- Steve Garson, SD-WAN Experts
-
Answer
29 Mar 2022
What is the role of machine learning in networking?
Incorporating machine learning tools into a network can help teams predict traffic flows, generate smarter analytics, monitor network health, tighten security measures and more. Continue Reading
By- John Burke, Nemertes Research
-
Feature
24 Mar 2022
SecOps and cybersecurity basics for NetOps teams
To bridge the gap between NetOps and SecOps teams, network pros should know security fundamentals, including different types of attackers, attacks and available security services. Continue Reading
By- Michaela Goss, Senior Site Editor
-
Tutorial
21 Mar 2022
NetOps vs. DevOps vs. NetSecOps: What's the difference?
DevOps, NetOps and NetSecOps ... oh my! These IT concepts have their differences, but at the end of the day, they're family. Here's how they relate. Continue Reading
By- Alissa Irei, Senior Site Editor
-
Definition
21 Mar 2022
What is NetOps? Everything you need to know
NetOps, also referred to as NetOps 2.0 and NetDevOps, is an approach to networking operations that uses DevOps tools and techniques to make network changes more efficiently and effectively than in the past. Continue Reading
By- Kate Gerwig, Editorial Director
-
News
18 Mar 2022
Startup OneLayer offers IoT security on cellular networks
Israeli startup OneLayer has launched from stealth with $8.2 million in seed funding and a software-based platform to secure IoT devices on private LTE and 5G networks. Continue Reading
By- Madelaine Millar, TechTarget
-
Definition
16 Mar 2022
network segmentation
Network segmentation is a networking architectural design that divides a network into multiple segments (subnets) with each functioning as a smaller, individual network. Continue Reading
-
Tip
15 Mar 2022
How to secure NetOps initiatives using Agile methodology
As more NetOps teams implement Agile methods, network and security testing must be part of a holistic approach that involves developers, networking and security teams working together. Continue Reading
By- John Cavanaugh, BlueAlly
-
Definition
11 Mar 2022
screened subnet
A screened subnet, or triple-homed firewall, refers to a network architecture where a single firewall is used with three network interfaces. Continue Reading
By -
Tip
09 Mar 2022
The rise of the NetOps engineer
The need for NetOps engineers with network automation and software development skills is rising with the continued drive to create more flexible networks. Find out what it takes. Continue Reading
By- Terry Slattery, NetCraftsmen
-
News
25 Feb 2022
Arista embeds security software in campus switches
Arista Networks will embed network detection and response software in campus switches to provide AI-driven threat detection across the network. Continue Reading
By- Madelaine Millar, TechTarget
-
Definition
25 Feb 2022
Internet Key Exchange (IKE)
Internet Key Exchange (IKE) is a standard protocol used to set up a secure and authenticated communication channel between two parties via a virtual private network (VPN). Continue Reading
By- Andrew Zola
- Alexander S. Gillis, Technical Writer and Editor
-
Tip
25 Feb 2022
A review of Zscaler SASE architecture
Zscaler has a strong cloud-native architecture for secure internet access. But it doesn't deliver SD-WAN or converge internet access and WAN security, leaving it with only part of a SASE platform. Continue Reading
By- Steve Garson, SD-WAN Experts
-
News
15 Feb 2022
Juniper acquires zero-trust security startup WiteSand
Juniper has acquired zero-trust security company WiteSand. The startup's cloud-native technology could find a home in Juniper's Mist and SASE platforms. Continue Reading
By- Madelaine Millar, TechTarget
-
News
09 Feb 2022
Palo Alto announces ML-enabled software update and firewalls
Palo Alto's updated PAN-OS software uses machine learning to analyze network traffic in real time, and two firewall appliances provide the processing power to support it. Continue Reading
By- Madelaine Millar, TechTarget
-
Definition
03 Feb 2022
access control list (ACL)
An access control list (ACL) is a list of rules that specifies which users or systems are granted or denied access to a particular object or system resource. Continue Reading
By- Ben Lutkevich, Site Editor
-
News
01 Feb 2022
Cato Networks adds CASB to growing SASE portfolio
Cato Networks has added CASB app visibility and enforcement capabilities to its growing SASE portfolio, and plans to add data loss prevention in the coming months. Continue Reading
By- Madelaine Millar, TechTarget
-
Feature
31 Jan 2022
Edge, public cloud, security drive network transformation
Networking is starting to reflect innovations in compute and public cloud. A notable change will be how network teams view networking and security as a holistic platform. Continue Reading
By- Jennifer English, Executive Editor
-
Tip
26 Jan 2022
Integrating zero-trust practices into private 5G networks
One of the first steps in deploying a technology is protecting it from potential security threats. Learn how to secure a private 5G network with zero-trust security practices. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Tip
18 Jan 2022
How to implement network segmentation for better security
For a network segmentation strategy to be effective and improve security, network teams need to create detailed security policies, identify each resource and use allowlists. Continue Reading
By- Terry Slattery, NetCraftsmen
-
Definition
04 Jan 2022
access log
An access log is a list of all requests for individual files -- such as Hypertext Markup Language files, their embedded graphic images and other associated files that get transmitted -- that people or bots have made from a website. Continue Reading
By -
Tip
30 Dec 2021
Explore 9 essential elements of network security
Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other. Continue Reading
By- Lee Doyle, Doyle Research
- Charles Kolodgy, Security Mindsets
-
Infographic
28 Dec 2021
Review the major networking acquisitions of 2021
When a networking vendor announces plans to acquire another company, most people take notice. Explore which vendors made moves in 2021 and what those purchases mean. Continue Reading
By- Jennifer English, Executive Editor
-
Tip
17 Dec 2021
5 trends in enterprise networking that defined 2021
In 2020, enterprises shifted to remote work due to the pandemic. The trend continued in 2021, along with four other networking trends that defined the year and will extend into 2022. Continue Reading
By- Elizabeth Thorne, TeleGeography
-
Definition
10 Dec 2021
virtual local area network hopping (VLAN hopping)
Virtual local area network hopping (VLAN hopping) is a method of attacking the network resources of a VLAN by sending packets to a port not usually accessible from an end system. Continue Reading
By -
News
01 Dec 2021
Palo Alto Networks and GTT to launch managed SASE platform
GTT Communications and Palo Alto Networks announced they will partner to offer a managed SASE platform using Prisma Access, Palo Alto's cloud-based security function. Continue Reading
By- Madelaine Millar, TechTarget
-
Feature
24 Nov 2021
Ultimate guide to secure remote access
This comprehensive secure remote access guide outlines the strategies, tools and best practices to provide anywhere access while protecting data, systems and users. Continue Reading
-
Feature
23 Nov 2021
SecOps' need for traffic data drives NetSecOps collaboration
Security teams want to analyze network traffic data to identify anomalies and threats. As a result, network and security teams need to find ways to work together. Continue Reading
By- Shamus McGillicuddy, Enterprise Management Associates
-
Definition
16 Nov 2021
CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)
A CAPTCHA is a type of challenge-response system designed to differentiate humans from robotic computer programs. Continue Reading
-
Tip
15 Nov 2021
How zero-trust SDP can work with a VPN for remote work
Implementing software-defined perimeter and zero-trust security models with a corporate VPN adds significant layers of user and device verification and authentication. Continue Reading
By -
News
11 Nov 2021
AT&T launches a managed SASE offering with Cisco
AT&T aims its latest managed SASE service at enterprises using Cisco hardware. The offering's features range from firewall and secure web gateway functionality to DNS layer security. Continue Reading
By- Madelaine Millar, TechTarget
-
Tip
04 Nov 2021
Evaluate the components of Cisco SASE
Cisco's SASE platform, Umbrella, has all the components of a SASE architecture, but it has a lot of integration complexity and a reliance on appliances. Continue Reading
By- Steve Garson, SD-WAN Experts
-
Tip
01 Nov 2021
Adopt 5 best practices for hybrid workplace model security
As hybrid workforce models become the norm due to the pandemic, enterprises should look to best practices to ensure secure unified access for on-premises and WFH employees. Continue Reading
By- Johna Till Johnson, Nemertes Research
-
Tip
29 Oct 2021
Use network standardization to facilitate automation
Network teams can automate and standardize network designs to improve configurations, simplify operations and more easily implement changes within their networks. Continue Reading
By- Terry Slattery, NetCraftsmen
-
Definition
25 Oct 2021
payload (computing)
In computing, a payload is the carrying capacity of a packet or other transmission data unit. Continue Reading
By- Andrew Froehlich, West Gate Networks
- Peter Loshin, Former Senior Technology Editor
-
Definition
05 Oct 2021
Layer Two Tunneling Protocol (L2TP)
Layer Two Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by an internet service provider (ISP) to enable the operation of a virtual private network (VPN) over the internet. Continue Reading
By -
Answer
04 Oct 2021
Remote access vs. site-to-site VPN: What's the difference?
A remote access VPN connects remote users from any location to a corporate network. A site-to-site VPN, meanwhile, connects individual networks to each other. Continue Reading
By- Paul Kirvan
- Lisa Phifer, Core Competence
-
Feature
30 Sep 2021
6 reasons unpatched software persists in the enterprise
Patching is like flossing -- everyone knows they should do it, yet too few do it often and well. Explore why unpatched software is still ubiquitous, despite the risks. Continue Reading
By- Alissa Irei, Senior Site Editor
-
Feature
23 Sep 2021
Experts debate XDR market maturity and outlook
Is extended detection response still all buzz and no bite? Experts disagree on whether XDR qualifies as a legitimate market yet or still has a ways to go. Continue Reading
By- Alissa Irei, Senior Site Editor
-
Tip
21 Sep 2021
A review of Cato Networks' SASE Cloud platform
Cato's SASE Cloud lacks some features and may require customers to replace point products to fully benefit from the platform. But Cato aligns with SASE’s cloud-native vision and is a strong contender in the market. Continue Reading
By- Steve Garson, SD-WAN Experts
-
Definition
26 Aug 2021
stateful inspection
Stateful inspection, also known as dynamic packet filtering, is a firewall technology that monitors the state of active connections and uses this information to determine which network packets to allow through the firewall. Continue Reading
-
Tip
11 Aug 2021
A deep dive into Fortinet's SASE platform
Despite its strong security foundation, Fortinet's SASE platform lacks a cloud-native strategy and requires teams to stitch the architecture together. Continue Reading
By- Steve Garson, SD-WAN Experts
-
Definition
26 Jul 2021
network access control (NAC)
Network access control (NAC), also called network admission control, is a method to bolster the security, visibility and access management of a proprietary network. Continue Reading
-
Definition
22 Jul 2021
SYN scanning
SYN scanning is a tactic that a malicious hacker can use to determine the state of a communications port without establishing a full connection. Continue Reading
-
Definition
13 Jul 2021
passive attack
A passive attack is a network attack in which a system is monitored and sometimes scanned for open ports and vulnerabilities. Continue Reading
-
Answer
13 Jul 2021
The differences between PAP and CHAP
PAP uses a two-way handshake to authenticate client sessions, while CHAP uses a three-way handshake. Both authentication processes are common, but one is more secure. Continue Reading
By- Andrew Froehlich, West Gate Networks
- Mark Tuomenoksa, illumivu
-
Definition
08 Jul 2021
Snort
Snort is an open source network intrusion detection system (NIDS) created by Sourcefire founder and former CTO Martin Roesch. Continue Reading
-
Quiz
30 Jun 2021
12 official practice questions for the CCNA 200-301 exam
These practice questions for CCNA 200-301 lay out what readers need to know about network security and IP routing in the LAN, from 'CCNA 200-301 Official Cert Guide, Volumes 1 and 2.' Continue Reading
By- Michaela Goss, Senior Site Editor
- Jennifer English, Executive Editor
- Pearson Education
-
Feature
25 Jun 2021
How enterprises can close 5 major SASE gaps
Despite five major gaps that hamper SASE implementation, Gartner recommended enterprises should plan their migration timeline and aim to consolidate to a single vendor. Continue Reading
By- Deanna Darah, Site Editor
-
Opinion
25 Jun 2021
Hybrid workforce model needs long-term security roadmap
From SASE to ZTNA to EDR to VPNs, enterprises need to deploy the technologies to develop a secure hybrid workforce model now that can work into the future. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Answer
22 Jun 2021
How to use two VPN connections at the same time
Network managers and users might opt to set up two VPN connections at the same time, from the same remote device. But that might not be possible -- or safe. Continue Reading
By- Paul Kirvan
- Lisa Phifer, Core Competence
-
Report
15 Jun 2021
Guide to business continuity and pandemic planning
This guide explains the enterprise impact of the COVID-19 pandemic and how business continuity planning keeps organizations safe and in operation. Continue Reading
-
Tip
11 Jun 2021
The pros and cons of Palo Alto Networks' SASE platform
Palo Alto Networks is commonly mentioned in SASE discussions. While the vendor has strong security capabilities, it also brings integration complexities and PoP limitations. Continue Reading
By- Steve Garson, SD-WAN Experts
-
Tip
07 Jun 2021
How to pick the best network security service provider
Managed security service providers have different levels of expertise. Be sure to match your organization's security needs with the right network security provider. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
Tip
04 Jun 2021
5 steps to secure the hybrid workforce as offices reopen
Companies must now face the security challenges of overseeing a hybrid workforce as employees return to the office. Continue Reading
By- Ashwin Krishnan, StandOutin90Sec
-
News
02 Jun 2021
Microsoft buys ReFirm Labs to bolster IoT firmware security
Microsoft has bought ReFirm Labs in an IoT security play. The company said Refirm's open source-based products would help it address firmware vulnerabilities in IoT devices. Continue Reading
By- Mike Gleason, News Writer
-
Feature
02 Jun 2021
What is secure remote access in today's enterprise?
Out with the old, in with the new. The meaning of secure remote access, and how organizations achieve it, is changing. Here's what you need to know. Continue Reading
By- Alissa Irei, Senior Site Editor
-
Tip
01 Jun 2021
Who is responsible for secure remote access management?
The pandemic exposed the need for a strong secure remote access strategy. Now, organizations need to figure out which team must make it happen. Continue Reading
By- Johna Till Johnson, Nemertes Research
-
Feature
28 May 2021
Network reconnaissance techniques for beginners
In this excerpt of 'How Cybersecurity Really Works,' author Sam Grubb breaks down common network reconnaissance techniques used by adversaries to attack wired networks. Continue Reading
By- Katie Donegan, Social Media Manager
- No Starch Press
-
Feature
21 May 2021
RSA Conference 2021: 3 hot cybersecurity trends explained
In a lightning round session at RSA Conference, ESG analysts discussed three of the hottest topics in cybersecurity in 2021: zero trust, XDR and SASE. Continue Reading
By- Sharon Shea, Executive Editor
-
Feature
20 May 2021
4 ways to handle the cybersecurity skills shortage in 2021
More than half of cybersecurity pros say their organizations could do more to manage negative effects of the skills shortage, such as overwork and burnout. Find out how. Continue Reading
By- Alissa Irei, Senior Site Editor
-
Feature
17 May 2021
Cyber Defense Matrix makes sense of chaotic security market
The Cyber Defense Matrix aims to help CISOs make strategic, informed security investments that weigh cyber risk mitigation in the context of business constraints and goals. Continue Reading
By- Alissa Irei, Senior Site Editor
-
News
14 May 2021
Cisco's latest acquisition spree nabs three companies
Cisco's acquisitions, announced this week, would improve event hosting in Webex, boost network speeds for 5G, and enhance its security platform. Deal terms were not released. Continue Reading
By- Mike Gleason, News Writer
-
Tip
14 May 2021
Enterprises mull 5G vs. Wi-Fi security with private networks
While Wi-Fi security can be implemented just as securely as 5G, mechanisms built into 5G offer some compelling benefits to enterprises considering private 5G networks. Continue Reading
By- Andrew Froehlich, West Gate Networks