Network security
With the growth of malware and data breaches, enterprises must ensure their networks -- and the applications and traffic on those networks -- are secure. Learn about important network security strategies and technologies, such as VPNs, Secure Access Service Edge (SASE), zero trust and software-defined perimeter (SDP).
Top Stories
-
Tip
08 Jan 2025
How to protect VMs with Azure Bastion hosts
Port scans are a popular hacking technique used to find network vulnerabilities. Could Azure Bastion hosts provide the network security businesses need? Continue Reading
By -
Opinion
26 Dec 2024
3 network security predictions for 2025
What does 2025 have in store for network security? Analyst John Grady from Informa TechTarget's Enterprise Strategy Group shares his predictions for the upcoming year. Continue Reading
By- John Grady, Principal Analyst
-
Enterprise Strategy Group
We provide market insights, research and advisory, and technical validations for tech buyers.
-
Answer
10 Jul 2020
What are the risks of third-party VPN services?
IP address leaks, DNS service leaks and WebRTC transmissions could expose your online activities if you use certain unreliable third-party VPN services. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
News
02 Jul 2020
Tech pros focus on application delivery during pandemic
Tech pros have added security, automation and session capacity to their application delivery infrastructure to support business operations during the pandemic. Continue Reading
By- Antone Gonsalves, Editor at Large
-
News
26 Jun 2020
COVID-19 tech will fail without employee privacy
Businesses can choose from a growing number of mobile apps and Wi-Fi software to protect workers from COVID-19. But tech won't succeed without top-of-the-line privacy protection. Continue Reading
By- Antone Gonsalves, Editor at Large
-
Answer
19 Jun 2020
How to prevent network eavesdropping attacks
One of the biggest challenges of network eavesdropping attacks is they are difficult to detect. Read about prevention measures to help keep your network safe from snoopers and sniffers. Continue Reading
By- Sharon Shea, Executive Editor
-
Tip
18 Jun 2020
What to know about VPN termination
Network teams make several decisions when designing a secure VPN. One of those is where in the network, logically, they will terminate the VPN tunnels. Continue Reading
By- Terry Slattery, NetCraftsmen
-
Answer
11 Jun 2020
Identifying and troubleshooting VPN session timeout issues
Troubleshooting VPN session timeout and lockout issues should focus first on isolating where the root of the problem lies -- be it the internet connection, the VPN vendor or the user device. Continue Reading
By- Michael Heller, TechTarget
- Matthew Pascucci
-
Answer
27 May 2020
Is VPN split tunneling worth the security risks?
Enabling VPN split tunneling may increase speed and decrease bandwidth use and costs, but it also increases the number of security vulnerabilities faced. Continue Reading
By- Sharon Shea, Executive Editor
-
Feature
21 May 2020
Top 5 VPN myths and misconceptions for IT organizations
Although VPN technology has its challenges, various misconceptions exist that can muddle IT teams' understandings of VPNs. Here are five common VPN misconceptions debunked. Continue Reading
By- Michaela Goss, Senior Site Editor
-
Tip
08 May 2020
How to protect the network from ransomware in 5 steps
Stronger network security could be the key to preventing a ransomware infection. Follow these five steps to protect your network from ransomware. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Quiz
06 May 2020
Test your cyber-smarts with this network security quiz
Show what you know about the topics covered in the May 2020 issue of Information Security magazine. If you get nine of 10 answers right, you'll also receive CPE credit! Continue Reading
By- Brenda L. Horrigan, Executive Managing Editor
-
Answer
04 May 2020
What are the differences between VPN and VDI services?
With a common denominator of 'virtual,' both VPNs and VDI are common in remote work strategies. However, the technologies differ in terms of cost, use cases and performance. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Feature
01 May 2020
AI-powered cyberattacks force change to network security
Companies now face sophisticated enemies using AI and machine learning tools for their attacks. It's a world of new dangers for those defending network systems and data. Continue Reading
By -
Opinion
01 May 2020
Plan now for the future of network security
How to battle well-funded, technologically sophisticated threats and ensure high-quality network performance? CISOs need a plan to meet network challenges now and in the future. Continue Reading
By- Ben Cole, Executive Editor
- E-Zine 01 May 2020
-
Tip
01 May 2020
The pros and cons of SD-WAN and remote access
SD-WAN could be a compelling option for enterprises that require remote access for mission-critical jobs. But IT teams should be aware of cost, training and implementation barriers. Continue Reading
By- Lee Doyle, Doyle Research
-
Feature
29 Apr 2020
Open Systems' SASE tech wins TechTarget innovation award
Open Systems' SASE platform helped tens of thousands of workers gain secure remote access during the COVID-19 crisis. Learn more about our new Network Innovation Award winner. Continue Reading
By- Alissa Irei, Senior Site Editor
-
News
28 Apr 2020
How telemedicine, SD-WAN helped two firms get back to work
COVID-19 is forcing companies to rethink their workplaces. Medical companies TrialCard and Vohra have turned to SD-WAN and telemedicine, respectively, to keep employees productive. Continue Reading
By- Antone Gonsalves, Editor at Large
-
Feature
20 Apr 2020
Zero-trust management challenges outweighed by benefits
The zero-trust model's adoption, deployment and management challenges are easily outweighed by its ability to offset modern threats, IEEE senior member Jack Burbank advises. Continue Reading
By- Sharon Shea, Executive Editor
-
Feature
17 Apr 2020
A glossary of the VPN terminology you need to know
For organizations with remote workforces, VPNs can be an essential part of daily life. This VPN glossary explores the essential terms and phrases that constitute VPN services. Continue Reading
By- Michaela Goss, Senior Site Editor
-
Tip
15 Apr 2020
Tips to improve network visibility and security
Network visibility and security can be tricky, especially with the range of products available. These tips help teams pinpoint potential vulnerabilities and gauge the tools they need. Continue Reading
By- Terry Slattery, NetCraftsmen
- John Cavanaugh, BlueAlly
-
Feature
13 Apr 2020
What to include in an SD-WAN security checklist
SD-WAN security encompasses more than integrated security functionality. Find out which capabilities enterprises should look for when evaluating SD-WAN and security. Continue Reading
By- John Burke, Nemertes Research
-
Tip
09 Apr 2020
How SASE architecture integrates with network infrastructure
SASE architecture offers a compelling value proposition, as it converges networking and security services onto a single cloud platform. Explore how it works with existing infrastructure. Continue Reading
By- Steve Garson, SD-WAN Experts
-
Tip
08 Apr 2020
Why SASE adoption requires a paradigm shift
Enterprises preparing to adopt Secure Access Service Edge should understand how the architecture presents organizational and architectural challenges for network and security teams. Continue Reading
By -
Tip
03 Apr 2020
Comparing SASE vs. traditional network security architectures
Today's dispersed environments need stronger networking and security architectures. Enter cloud-based Secure Access Service Edge -- a new model for secure network access. Continue Reading
By- Dave Shackleford, Voodoo Security
-
Answer
02 Apr 2020
Considering the differences in LAN vs. WAN security
Given the differences in the security of LAN and WAN, enterprises need to guard against insider threats, secure against unauthorized access and potentially secure the edge, too. Continue Reading
By- Michael Heller, TechTarget
-
News
01 Apr 2020
CloudGenix-Palo Alto buy combines SD-WAN with cloud security
The CloudGenix-Palo Alto Networks acquisition will combine the Prisma cloud security suite with CloudGenix's software-defined WAN. Continue Reading
By- Antone Gonsalves, Editor at Large
-
News
24 Mar 2020
Cisco security GM discusses plan for infosec domination
At RSA Conference 2020, Gee Rittenhouse, senior vice president and general manager of Cisco's security group, talks about the company's strategy to reshape the infosec industry. Continue Reading
By- Rob Wright, Senior News Director
-
Feature
24 Mar 2020
Experts say CIA security triad needs a DIE model upgrade
Using a distributed, immutable, ephemeral strategy instead of the traditional CIA triad could enable enterprises to encourage security by design and minimize risk, two experts say. Continue Reading
By- Michael Heller, TechTarget
-
Tip
06 Mar 2020
The convergence of networking and security at the edge
Networking and security are converging with offerings like SD-WAN and SD-branch. But enterprises and vendors must overcome IT silos that delay innovation and decision-making. Continue Reading
By- Lee Doyle, Doyle Research
-
Tip
04 Mar 2020
Plan a VPN and remote access strategy for pandemic, disaster
Disasters and pandemics occur unexpectedly, affecting companies, workers and networks alike. Plan a remote access strategy that covers VPN requirements, bandwidth demands and licenses. Continue Reading
By -
Feature
28 Feb 2020
Network traffic analysis best practices: Assess and repeat
Network traffic analysis best practices require network teams to work closely with security teams and constantly assess their tool sets, analysis processes and traffic patterns. Continue Reading
By- Jennifer English, Executive Editor
-
News
26 Feb 2020
CISA chief can't guarantee election security
CISA Chief Christopher Krebs told RSA attendees he can't guarantee election security. Krebs also discussed CISA's efforts against Iranian hackers and ransomware attacks. Continue Reading
By- Antone Gonsalves, Editor at Large
-
Answer
26 Feb 2020
Wired vs. wireless network security: Best practices
Explore the differences between wired and wireless network security, and read up on best practices to ensure security with or without wires. Continue Reading
By- Mike Chapple, University of Notre Dame
-
News
24 Feb 2020
Cisco SecureX provides front end for all security tools
Cisco SecureX, unveiled at RSA, provides centralized intelligence from all the vendor's security products. Also at RSA, Juniper adds encrypted traffic analysis to the Juniper ATP Cloud. Continue Reading
By- Antone Gonsalves, Editor at Large
-
News
24 Feb 2020
Cisco launches SecureX platform for integrated security
At RSA Conference 2020, Cisco unveiled SecureX, which integrates the vendor's security portfolio into a single platform with enhanced visibility and automation. Continue Reading
By- Rob Wright, Senior News Director
-
News
14 Feb 2020
Latest Cisco earnings show tech buyers remain skittish
The latest Cisco earnings report shows customers paused tech spending despite a stabler global economy, while the impact of the coronavirus outbreak in China was a looming unknown. Continue Reading
By- Antone Gonsalves, Editor at Large
-
Feature
30 Jan 2020
A look inside 'CCNA 200-301 Official Cert Guide, Volume 2'
Network security is a crucial skills area for network engineers, and the CCNA 200-301 reflects this. Here's a chapter excerpt on network security from the new guide. Continue Reading
By- Michaela Goss, Senior Site Editor
- Pearson Education
-
News
28 Jan 2020
Cisco Cyber Vision targets industrial IoT security
Cisco Cyber Vision is the networking company's latest product for industrial IoT security. The technology is based on software Cisco acquired last year when it bought Sentryo. Continue Reading
By- Antone Gonsalves, Editor at Large
-
Tip
27 Jan 2020
Protect against evolving data security threats
As data security threats evolve, knowing how to protect your data is more important than ever. Learn about the latest security threats and how to ward them off. Continue Reading
By- Kevin Tolly, The Tolly Group
-
News
22 Jan 2020
Netgear under fire after TLS certificates found in firmware -- again
Security researchers revealed Netgear firmware exposed TLS certificate keys, but SearchSecurity discovered it wasn't the first time the issue had been reported to the vendor. Continue Reading
By- Alexander Culafi, Senior News Writer
-
Tip
23 Dec 2019
The top network security trends, threats and strategies in 2020
Ransomware and attacks against cloud providers reflect key network security trends in 2020. To combat these threats preemptively, assess your specific network needs. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Tip
17 Dec 2019
Perimeterless security still has borders -- and APIs need it
Many people believe perimeterless security means borders are a thing of the past. But virtual borders secure APIs needed by mobile users and cloud workloads. Check out how to manage them. Continue Reading
By- Tom Nolle, Andover Intel
-
Tip
03 Dec 2019
Network security design best practices and principles: Keep it simple
Comprehensive network security design means understanding the components that constitute your network and how and when everything is managed. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Answer
25 Nov 2019
The network security tools to combat modern threats
Incorporating new network security tools and methods into your enterprise's infosec program may mean the difference between staying safe or falling victim to an attack. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Opinion
20 Nov 2019
What's the answer for 5G security?
Learn about the planning of 3GPP in developing specifications for 5G security in this synopsis of 5G Americas' white paper, 'The Evolution of Security in 5G.' Continue Reading
-
Tip
19 Nov 2019
Boost network security visibility with these 4 technologies
The network is where it's at if you want to stop malicious actors. But first you need to up your network visibility. Learn about four technologies that can help. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Tip
19 Nov 2019
Network visibility and monitoring tools now amp up security
Three technology trends are currently making network visibility even more central to security tools. Learn more about the impact of big data, AI and APIs. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Tip
19 Nov 2019
Why Secure Access Service Edge is the future of SD-WAN
Secure Access Service Edge -- or SASE -- architecture transitions from network designs that revolve around the data center to a model based on identity and user context. Continue Reading
By- Steve Garson, SD-WAN Experts
-
Tip
18 Nov 2019
Use network traffic analysis to detect next-gen threats
Network traffic analysis, network detection and response -- whichever term you prefer, the technology is critical to detecting new breeds of low-and-slow threats. Continue Reading
By- Kevin Tolly, The Tolly Group
-
Tip
15 Nov 2019
The top 10 network security best practices to implement today
Even as security techniques improve, attackers are becoming more adept. Learn about 10 network security best practices and how they can keep your network secure. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
Tip
12 Nov 2019
A fresh look at enterprise firewall management
Enterprises need to know where and how to install firewalls for maximum protection. Find out firewall management best practices that can help protect your organization. Continue Reading
By- Tom Nolle, Andover Intel
-
Tip
08 Nov 2019
After a data breach occurs, follow this network security checklist
Before a network breach occurs, you should already have a response plan in place. To make sure you're taking a proactive approach, follow this network security checklist. Continue Reading
By- Kevin Tolly, The Tolly Group
-
Feature
07 Nov 2019
Creating and managing a zero-trust security framework
IEEE senior member Kevin Curran outlines how enterprises should introduce a zero-trust security framework and discusses implementation challenges they are likely to face. Continue Reading
By- Sharon Shea, Executive Editor
-
Answer
06 Nov 2019
Network security vs. application security: What's the difference?
Different tools protect different assets at the network and application layers. But both network and application security need to support the larger security plan. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Tip
04 Nov 2019
Build an effective SD-WAN security strategy at the branch
Don't deploy SD-WAN without a solid network security strategy. IT teams should address four specific areas to ensure adequate security and protection against network threats. Continue Reading
By- Lee Doyle, Doyle Research
- Charles Kolodgy, Security Mindsets
-
Tip
01 Nov 2019
Increase security visibility with network automation tasks
IT teams can set up automation tasks that generate security reports about network traffic data. These read-only dashboards are useful for executives that ask for system updates. Continue Reading
By- Samuel Bickham, NetCraftsmen
- Terry Slattery, NetCraftsmen
-
Tip
15 Oct 2019
5 steps to follow in a network security audit checklist
Planning, execution, analysis, reporting and follow-up are the basic elements of a network security audit checklist. But coordination among IT teams is also important. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Tip
14 Oct 2019
Top 3 network security threats and how to protect against them
Enterprise networks are seemingly always under attack. Learn about the most common network security threats and what protections you should have in place. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
Feature
09 Oct 2019
Security, business agility kindle network automation adoption
IT teams are confused by the multiple automation strategies available, but they're still adopting automation with hopes it will benefit network security and agility. Continue Reading
By- Jennifer English, Executive Editor
-
Tip
09 Oct 2019
How to develop and implement a network security plan
When formulating a focused network security plan, you'll need to address specific questions about outbound traffic, user logins and government regulations. Continue Reading
By- Kevin Tolly, The Tolly Group
-
Tip
07 Oct 2019
Data center transformation drives the ADC security use case
Application delivery controllers play many roles, but the ADC security use case might be most important. Learn about ADC features and how they boost data center security. Continue Reading
By- Lee Doyle, Doyle Research
-
Tip
04 Oct 2019
Virtual network security measures to thwart access threats
Virtual networks add a layer of complexity to the real networks below them. Follow these three virtual network security measures to prevent complexity from creating issues. Continue Reading
By- Tom Nolle, Andover Intel
-
News
04 Oct 2019
Vendors lining up behind SASE for cloud security
SD-WAN and network security vendors tailor their portfolios to deliver SASE, a cloud security architecture for the age of SaaS, public clouds and IoT. Continue Reading
By- Antone Gonsalves, Editor at Large
-
Tip
02 Oct 2019
How can DNS privacy issues be addressed?
Learn two techniques for improving end-user DNS privacy protection that prevent DNS from exposing information about websites users visit and the people users communicate with. Continue Reading
By- Fernando Gont, SI6 Networks
-
Tip
02 Oct 2019
Automation improves firewall migration and network security
Firewall migration is a compelling automation use case, as automation scripts can shorten the migration process, eliminate unused rules and bolster overall network security. Continue Reading
By- Samuel Bickham, NetCraftsmen
- Terry Slattery, NetCraftsmen
-
Answer
25 Sep 2019
Do network layer and application layer DDoS attacks differ?
Network layer and application layer DDoS attacks are significant threats. Learn about the differences between them and what you can do to reduce their effects. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Tip
23 Sep 2019
How software-defined perimeter authentication ups security
Find out how the emerging software-defined perimeter model increases security by its design and how it can serve as a building block to zero-trust security. Continue Reading
By- Johna Till Johnson, Nemertes Research
-
Tip
19 Sep 2019
Cybersecurity frameworks hold key to solid security strategy
Cybersecurity frameworks take work, but they help organizations clarify their security strategies. If you don't have one, here's what to consider, even for emerging perimeterless security options. Continue Reading
By- Tom Nolle, Andover Intel
-
Answer
11 Sep 2019
How does 802.11ax security benefit from WPA3?
Security methods like WPA3 and Opportunistic Wireless Encryption will give a boost to 802.11ax security, but securing the new wireless standard is still pretty complicated. Continue Reading
By -
Tip
03 Sep 2019
How client VPN technologies will evolve with AI and automation
With help from artificial intelligence and automation, client VPN technologies could innovate the way they handle data flows within hybrid cloud environments. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Tip
29 Aug 2019
How SD-WAN security can boost your network security strategy
Many organizations say security is a top priority for their business, but most lack the necessary resources to thoroughly secure their networks and cloud services. SD-WAN could help. Continue Reading
By- Michaela Goss, Senior Site Editor
-
Quiz
19 Aug 2019
What are network firewalls? Test your network security IQ
Network firewalls have been an essential part of network security since the internet began. This quiz covers what network firewalls are and tests your security expertise. Continue Reading
By- Michaela Goss, Senior Site Editor
-
Answer
14 Aug 2019
What are the top 3 network analytics use cases?
Network analytics use cases illustrate some of the benefits that companies are receiving from network analysis tools. Gauging network performance is just one key area. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
Tip
08 Aug 2019
Understanding AWS security groups' capabilities and limitations
Expand your knowledge of AWS security groups. Learn how to configure them for traffic protection, along with how they compare to other firewall options on AWS. Continue Reading
By- Ofir Nachmani, I am OnDemand
-
News
02 Aug 2019
Cisco security flaw leads to $8.6M payout in whistleblower case
The settlement resolves allegations that a Cisco security flaw left governments vulnerable to hackers for years without the company taking action. Continue Reading
-
Tip
29 Jul 2019
SD-WAN security benefits go beyond the obvious
SD-WAN does more than extend corporate networks. Key SD-WAN security benefits that capitalize on the technique's architecture could change the face of SD-WAN in the enterprise. Continue Reading
By- Tom Nolle, Andover Intel
-
Answer
29 Jul 2019
How can network security analytics detect and thwart threats?
Network security analytics gives organizations an additional level of protection against malicious attacks. It works closely with network analytics tools. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
Feature
24 Jul 2019
Network teams spend more time than ever on network security issues
The workloads of network teams have evolved from their original objectives because of network security threats. Yet teams are still expected to maintain their initial goals. Continue Reading
By- Michaela Goss, Senior Site Editor
-
News
23 Jul 2019
Niagara Networks and L7 Defense team up for API security
The L7 Defense application Ammune API Defense will run on Niagara Networks' Open Visibility Platform in an effort to bring security to API communications. Continue Reading
-
Feature
18 Jul 2019
Why did operator NFV adoption lag so much?
NFV adoption was hampered by high costs and deployment issues, according to one industry insider. Also, learn about the latest on network security and industry hype. Continue Reading
By- Chuck Moozakis, Editor at Large
-
Feature
17 Jul 2019
The 5 network security basics you need to know
In this compilation, learn what network security is, as well as how it differs from cybersecurity, common -- and potentially confusing -- technologies, threats and more. Continue Reading
By- Michaela Goss, Senior Site Editor
-
Answer
11 Jul 2019
What does stateful vs. stateless mean in a networking context?
When it comes to understanding state from a networking perspective, knowing the difference between stateful vs. stateless firewalls is a crucial starting point. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Opinion
08 Jul 2019
Who's to blame for ransomware attacks -- beyond the attackers?
Cyberattackers are to blame for ransomware attacks, but what about companies that release flawed software or don't install patches? Our expert looks at where the buck stops. Continue Reading
By- Kevin McDonald, Alvaka Networks
-
Feature
02 Jul 2019
A glossary of 10 essential network security terms
This network security glossary covers both old and new key terms -- such as zero trust networks and microsegmentation -- that can bolster anyone's security vocabulary. Continue Reading
By- Michaela Goss, Senior Site Editor
-
Guide
28 Jun 2019
How to improve network visibility and regain control
Gaining visibility into the network has never been easy; technology like cloud and IoT makes it even tougher. Learn how to meet such challenges and keep network traffic flowing. Continue Reading
By- Brenda L. Horrigan, Executive Managing Editor
-
News
27 Jun 2019
Pica8 PicOS upgrade enhances network security
Pica8 claims its PicOS network operating system will address rising security and efficiency challenges with its new network access control integrations. Continue Reading
By- Sabrina Polin, Managing Editor
-
Feature
26 Jun 2019
What networking analysts are saying about Cisco's future
Has Cisco outgrown networking? One industry insider seems to think so. Plus, other analysts size up Cisco's future around security and intent-based networking. Continue Reading
By- Luke O'Neill, Executive Editor
-
News
24 Jun 2019
Aviatrix adds next-gen firewalls to cloud services
The Palo Alto Networks VM-Series next-generation firewalls are now deployed as part of Aviatrix's Firewall Network Service -- an extension of the Multi-Cloud Backbone portfolio. Continue Reading
-
News
18 Jun 2019
DH2i's DxConnect brings zero-trust connectivity to networks
DH2i's zero-trust architecture software, DxConnect, will address common security issues and bring microtunnel development, discreet invisibility, an open API and more. Continue Reading
By- Sabrina Polin, Managing Editor
-
Tip
17 Jun 2019
The role of edge computing security in enterprise networks
By ensuring IoT security, IT teams can secure enterprise networks as well. Edge computing can provide one path toward this security, as long as IT properly evaluates and plans for it. Continue Reading
By- John Burke, Nemertes Research
-
News
12 Jun 2019
Ixia network packet broker, cybersecurity test introduced
Ixia launched two new products for networking and security: the Ixia network packet broker, Vision X, for data center visibility and Ixia BreakingPoint QuickTest to gauge device and network security. Continue Reading
By- Sabrina Polin, Managing Editor
-
News
11 Jun 2019
CEO Robbins: Cisco won't use Huawei ban in sales pitch
CEO Chuck Robbins said Cisco won't use the U.S. ban on Huawei exports in sales pitches. Robbins also said the Huawei ban has not had an effect on sales. Continue Reading
By- Antone Gonsalves, Editor at Large
-
News
07 Jun 2019
Sentryo acquisition to bolster Cisco IIoT security
Cisco plans to acquire industrial security firm Sentryo. The acquisition would add network visibility, anomaly detection and real-time threat detection to the Cisco IIoT portfolio. Continue Reading
By- Antone Gonsalves, Editor at Large
-
News
24 May 2019
Cisco vulnerability fix for thrangrycat carries risks
The Cisco vulnerability fix for thrangrycat could make affected hardware unusable. But the vendor said its ready to replace products, if needed. Continue Reading
By- Antone Gonsalves, Editor at Large
-
Podcast
22 May 2019
Risk & Repeat: Cisco vulnerabilities raise backdoor concerns
This week's Risk & Repeat podcast looks at vulnerabilities in Cisco and Huawei products, which have raised concerns about backdoor access in networking equipment. Continue Reading
By- Rob Wright, Senior News Director
-
News
20 May 2019
Marconi Mainnet launched for building, scaling complex networks
The Marconi Mainnet platform provides blockchain security, multi-cloud connectivity, advanced firewalls and secure gateways for decentralized networks. Continue Reading
By- Sabrina Polin, Managing Editor
-
News
15 May 2019
Extreme launches autonomous network strategy at Extreme Connect
Extreme unveils its building blocks for an autonomous network, called Elements. The company also introduces at the Extreme Connect show an IoT security tool. Continue Reading
By- Antone Gonsalves, Editor at Large
-
Feature
13 May 2019
DDoS attacks among top 5G security concerns
DDoS attacks top the list of primary security concerns for mobile operators now that 5G wireless is advancing as the number of connected devices grows. Continue Reading
By- Madelyn Bacon, TechTarget
-
News
10 May 2019
Cisco AMP for Networks bolsters SD-WAN security
Cisco AMP for Networks is now part of the company's SD-WAN product. Cisco also announced this week that it had open sourced its MindMeld AI development platform. Continue Reading
By- Antone Gonsalves, Editor at Large
-
Answer
08 May 2019
What is network traffic analytics and how does it enhance security?
Network traffic analysis has evolved to incorporate machine learning techniques that help identify network security threats in real time and expedite a response. Continue Reading
By- Amy Larsen DeCarlo, GlobalData