Network security
With the growth of malware and data breaches, enterprises must ensure their networks -- and the applications and traffic on those networks -- are secure. Learn about important network security strategies and technologies, such as VPNs, Secure Access Service Edge (SASE), zero trust and software-defined perimeter (SDP).
Top Stories
-
Tip
22 Jul 2024
Where to place a firewall in an enterprise network
Firewalls are a foundational element of a strong security posture, and their positioning affects both enterprise performance and cyberdefense. Continue Reading
-
Answer
19 Jul 2024
How to protect port 139 from SMB attacks
Keeping port 139 open is perfectly normal -- but only for good reason. Without the proper protections, it can present a major security risk. Continue Reading
-
Answer
25 Nov 2019
The network security tools to combat modern threats
Incorporating new network security tools and methods into your enterprise's infosec program may mean the difference between staying safe or falling victim to an attack. Continue Reading
-
Opinion
20 Nov 2019
What's the answer for 5G security?
Learn about the planning of 3GPP in developing specifications for 5G security in this synopsis of 5G Americas' white paper, 'The Evolution of Security in 5G.' Continue Reading
-
Tip
19 Nov 2019
Boost network security visibility with these 4 technologies
The network is where it's at if you want to stop malicious actors. But first you need to up your network visibility. Learn about four technologies that can help. Continue Reading
-
Tip
19 Nov 2019
Network visibility and monitoring tools now amp up security
Three technology trends are currently making network visibility even more central to security tools. Learn more about the impact of big data, AI and APIs. Continue Reading
-
Tip
19 Nov 2019
Why Secure Access Service Edge is the future of SD-WAN
Secure Access Service Edge -- or SASE -- architecture transitions from network designs that revolve around the data center to a model based on identity and user context. Continue Reading
-
Tip
18 Nov 2019
Use network traffic analysis to detect next-gen threats
Network traffic analysis, network detection and response -- whichever term you prefer, the technology is critical to detecting new breeds of low-and-slow threats. Continue Reading
-
Tip
15 Nov 2019
The top 10 network security best practices to implement today
Even as security techniques improve, attackers are becoming more adept. Learn about 10 network security best practices and how they can keep your network secure. Continue Reading
-
Tip
12 Nov 2019
A fresh look at enterprise firewall management
Enterprises need to know where and how to install firewalls for maximum protection. Find out firewall management best practices that can help protect your organization. Continue Reading
-
Tip
08 Nov 2019
After a data breach occurs, follow this network security checklist
Before a network breach occurs, you should already have a response plan in place. To make sure you're taking a proactive approach, follow this network security checklist. Continue Reading
-
Feature
07 Nov 2019
Creating and managing a zero-trust security framework
IEEE senior member Kevin Curran outlines how enterprises should introduce a zero-trust security framework and discusses implementation challenges they are likely to face. Continue Reading
-
Answer
06 Nov 2019
Network security vs. application security: What's the difference?
Different tools protect different assets at the network and application layers. But both network and application security need to support the larger security plan. Continue Reading
-
Tip
04 Nov 2019
Build an effective SD-WAN security strategy at the branch
Don't deploy SD-WAN without a solid network security strategy. IT teams should address four specific areas to ensure adequate security and protection against network threats. Continue Reading
-
Tip
01 Nov 2019
Increase security visibility with network automation tasks
IT teams can set up automation tasks that generate security reports about network traffic data. These read-only dashboards are useful for executives that ask for system updates. Continue Reading
-
Tip
15 Oct 2019
5 steps to follow in a network security audit checklist
Planning, execution, analysis, reporting and follow-up are the basic elements of a network security audit checklist. But coordination among IT teams is also important. Continue Reading
-
Tip
14 Oct 2019
Top 3 network security threats and how to protect against them
Enterprise networks are seemingly always under attack. Learn about the most common network security threats and what protections you should have in place. Continue Reading
-
Feature
09 Oct 2019
Security, business agility kindle network automation adoption
IT teams are confused by the multiple automation strategies available, but they're still adopting automation with hopes it will benefit network security and agility. Continue Reading
-
Tip
09 Oct 2019
How to develop and implement a network security plan
When formulating a focused network security plan, you'll need to address specific questions about outbound traffic, user logins and government regulations. Continue Reading
-
Tip
07 Oct 2019
Data center transformation drives the ADC security use case
Application delivery controllers play many roles, but the ADC security use case might be most important. Learn about ADC features and how they boost data center security. Continue Reading
-
Tip
04 Oct 2019
Virtual network security measures to thwart access threats
Virtual networks add a layer of complexity to the real networks below them. Follow these three virtual network security measures to prevent complexity from creating issues. Continue Reading
-
News
04 Oct 2019
Vendors lining up behind SASE for cloud security
SD-WAN and network security vendors tailor their portfolios to deliver SASE, a cloud security architecture for the age of SaaS, public clouds and IoT. Continue Reading
-
Tip
02 Oct 2019
How can DNS privacy issues be addressed?
Learn two techniques for improving end-user DNS privacy protection that prevent DNS from exposing information about websites users visit and the people users communicate with. Continue Reading
-
Tip
02 Oct 2019
Automation improves firewall migration and network security
Firewall migration is a compelling automation use case, as automation scripts can shorten the migration process, eliminate unused rules and bolster overall network security. Continue Reading
-
Answer
25 Sep 2019
Do network layer and application layer DDoS attacks differ?
Network layer and application layer DDoS attacks are significant threats. Learn about the differences between them and what you can do to reduce their effects. Continue Reading
-
Tip
23 Sep 2019
How software-defined perimeter authentication ups security
Find out how the emerging software-defined perimeter model increases security by its design and how it can serve as a building block to zero-trust security. Continue Reading
-
Tip
19 Sep 2019
Cybersecurity frameworks hold key to solid security strategy
Cybersecurity frameworks take work, but they help organizations clarify their security strategies. If you don't have one, here's what to consider, even for emerging perimeterless security options. Continue Reading
-
Answer
11 Sep 2019
How does 802.11ax security benefit from WPA3?
Security methods like WPA3 and Opportunistic Wireless Encryption will give a boost to 802.11ax security, but securing the new wireless standard is still pretty complicated. Continue Reading
-
Tip
03 Sep 2019
How client VPN technologies will evolve with AI and automation
With help from artificial intelligence and automation, client VPN technologies could innovate the way they handle data flows within hybrid cloud environments. Continue Reading
-
Tip
29 Aug 2019
How SD-WAN security can boost your network security strategy
Many organizations say security is a top priority for their business, but most lack the necessary resources to thoroughly secure their networks and cloud services. SD-WAN could help. Continue Reading
-
Quiz
19 Aug 2019
What are network firewalls? Test your network security IQ
Network firewalls have been an essential part of network security since the internet began. This quiz covers what network firewalls are and tests your security expertise. Continue Reading
-
Answer
14 Aug 2019
What are the top 3 network analytics use cases?
Network analytics use cases illustrate some of the benefits that companies are receiving from network analysis tools. Gauging network performance is just one key area. Continue Reading
-
Tip
08 Aug 2019
Understanding AWS security groups' capabilities and limitations
Expand your knowledge of AWS security groups. Learn how to configure them for traffic protection, along with how they compare to other firewall options on AWS. Continue Reading
-
News
02 Aug 2019
Cisco security flaw leads to $8.6M payout in whistleblower case
The settlement resolves allegations that a Cisco security flaw left governments vulnerable to hackers for years without the company taking action. Continue Reading
-
Tip
29 Jul 2019
SD-WAN security benefits go beyond the obvious
SD-WAN does more than extend corporate networks. Key SD-WAN security benefits that capitalize on the technique's architecture could change the face of SD-WAN in the enterprise. Continue Reading
-
Answer
29 Jul 2019
How can network security analytics detect and thwart threats?
Network security analytics gives organizations an additional level of protection against malicious attacks. It works closely with network analytics tools. Continue Reading
-
Feature
24 Jul 2019
Network teams spend more time than ever on network security issues
The workloads of network teams have evolved from their original objectives because of network security threats. Yet teams are still expected to maintain their initial goals. Continue Reading
-
News
23 Jul 2019
Niagara Networks and L7 Defense team up for API security
The L7 Defense application Ammune API Defense will run on Niagara Networks' Open Visibility Platform in an effort to bring security to API communications. Continue Reading
-
Feature
18 Jul 2019
Why did operator NFV adoption lag so much?
NFV adoption was hampered by high costs and deployment issues, according to one industry insider. Also, learn about the latest on network security and industry hype. Continue Reading
-
Feature
17 Jul 2019
The 5 network security basics you need to know
In this compilation, learn what network security is, as well as how it differs from cybersecurity, common -- and potentially confusing -- technologies, threats and more. Continue Reading
-
Answer
11 Jul 2019
What does stateful vs. stateless mean in a networking context?
When it comes to understanding state from a networking perspective, knowing the difference between stateful vs. stateless firewalls is a crucial starting point. Continue Reading
-
Opinion
08 Jul 2019
Who's to blame for ransomware attacks -- beyond the attackers?
Cyberattackers are to blame for ransomware attacks, but what about companies that release flawed software or don't install patches? Our expert looks at where the buck stops. Continue Reading
-
Feature
02 Jul 2019
A glossary of 10 essential network security terms
This network security glossary covers both old and new key terms -- such as zero trust networks and microsegmentation -- that can bolster anyone's security vocabulary. Continue Reading
-
Guide
28 Jun 2019
How to improve network visibility and regain control
Gaining visibility into the network has never been easy; technology like cloud and IoT makes it even tougher. Learn how to meet such challenges and keep network traffic flowing. Continue Reading
-
News
27 Jun 2019
Pica8 PicOS upgrade enhances network security
Pica8 claims its PicOS network operating system will address rising security and efficiency challenges with its new network access control integrations. Continue Reading
-
Feature
26 Jun 2019
What networking analysts are saying about Cisco's future
Has Cisco outgrown networking? One industry insider seems to think so. Plus, other analysts size up Cisco's future around security and intent-based networking. Continue Reading
-
News
24 Jun 2019
Aviatrix adds next-gen firewalls to cloud services
The Palo Alto Networks VM-Series next-generation firewalls are now deployed as part of Aviatrix's Firewall Network Service -- an extension of the Multi-Cloud Backbone portfolio. Continue Reading
-
News
18 Jun 2019
DH2i's DxConnect brings zero-trust connectivity to networks
DH2i's zero-trust architecture software, DxConnect, will address common security issues and bring microtunnel development, discreet invisibility, an open API and more. Continue Reading
-
Tip
17 Jun 2019
The role of edge computing security in enterprise networks
By ensuring IoT security, IT teams can secure enterprise networks as well. Edge computing can provide one path toward this security, as long as IT properly evaluates and plans for it. Continue Reading
-
News
12 Jun 2019
Ixia network packet broker, cybersecurity test introduced
Ixia launched two new products for networking and security: the Ixia network packet broker, Vision X, for data center visibility and Ixia BreakingPoint QuickTest to gauge device and network security. Continue Reading
-
News
11 Jun 2019
CEO Robbins: Cisco won't use Huawei ban in sales pitch
CEO Chuck Robbins said Cisco won't use the U.S. ban on Huawei exports in sales pitches. Robbins also said the Huawei ban has not had an effect on sales. Continue Reading
-
News
07 Jun 2019
Sentryo acquisition to bolster Cisco IIoT security
Cisco plans to acquire industrial security firm Sentryo. The acquisition would add network visibility, anomaly detection and real-time threat detection to the Cisco IIoT portfolio. Continue Reading
-
News
24 May 2019
Cisco vulnerability fix for thrangrycat carries risks
The Cisco vulnerability fix for thrangrycat could make affected hardware unusable. But the vendor said its ready to replace products, if needed. Continue Reading
-
Podcast
22 May 2019
Risk & Repeat: Cisco vulnerabilities raise backdoor concerns
This week's Risk & Repeat podcast looks at vulnerabilities in Cisco and Huawei products, which have raised concerns about backdoor access in networking equipment. Continue Reading
-
News
20 May 2019
Marconi Mainnet launched for building, scaling complex networks
The Marconi Mainnet platform provides blockchain security, multi-cloud connectivity, advanced firewalls and secure gateways for decentralized networks. Continue Reading
-
News
15 May 2019
Extreme launches autonomous network strategy at Extreme Connect
Extreme unveils its building blocks for an autonomous network, called Elements. The company also introduces at the Extreme Connect show an IoT security tool. Continue Reading
-
Feature
13 May 2019
DDoS attacks among top 5G security concerns
DDoS attacks top the list of primary security concerns for mobile operators now that 5G wireless is advancing as the number of connected devices grows. Continue Reading
-
News
10 May 2019
Cisco AMP for Networks bolsters SD-WAN security
Cisco AMP for Networks is now part of the company's SD-WAN product. Cisco also announced this week that it had open sourced its MindMeld AI development platform. Continue Reading
-
Answer
08 May 2019
What is network traffic analytics and how does it enhance security?
Network traffic analysis has evolved to incorporate machine learning techniques that help identify network security threats in real time and expedite a response. Continue Reading
-
News
06 May 2019
Cisco SSH vulnerability sparks debate over backdoors
Cisco released a patch for a critical vulnerability in Nexus 9000 switches that could allow a remote attacker to gain root access because of the use of a default SSH key pair. Continue Reading
-
Answer
24 Apr 2019
What are the 5 types of network firewalls and how are they different?
As they monitor and filter network traffic, some firewalls can provide some pretty advanced security controls. But added packet inspection can slow network performance. Continue Reading
-
Tip
23 Apr 2019
How to build a strong cloud network security strategy
Building a secure network in the cloud is different from securing a traditional network. Learn what the main differences are and how to establish cloud networking security. Continue Reading
-
Tip
23 Apr 2019
The future of VPN will reflect the need for flexibility
The future of VPN services reflects the industry's trend toward software networking, evident in developments like SD-WAN and public cloud. The need for flexible technology is a main driver. Continue Reading
-
Tip
28 Mar 2019
4 steps to ensure virtual machine security in cloud computing
Enterprises are now operating in a cloud-virtual world. Understanding four steps to ensure virtual machine security in cloud computing environments is crucial. Continue Reading
-
Tip
27 Mar 2019
How to secure network devices in a hostile world
Find out how to secure network devices by locking down the biggest, riskiest holes to protect them from exploits long before some or all of the network crashes. Continue Reading
-
Feature
26 Mar 2019
Zero-trust security model primer: What, why and how
What exactly is a zero-trust security model? This primer explains the basics about the philosophy behind how designing a security architecture strictly limits access to all, not just outsiders. Continue Reading
-
Answer
22 Mar 2019
What tools can reinforce network edge security?
Firewalls, intrusion prevention systems and cloud-based threat intelligence are just a few of the many ways that organizations can bolster network edge security. Continue Reading
-
Answer
18 Mar 2019
What does a zero-trust model mean for network security?
A zero-trust model limits access and permissions according to a defined set of parameters that enterprises specify for each application. Learn what this means for network security. Continue Reading
-
News
08 Mar 2019
Battling misinformation focus of Facebook, Twitter execs' talk
Facebook and Twitter executives say finding a pattern of malicious activity is more effective in identifying bad actors on sites than looking at the misleading information itself. Continue Reading
-
News
07 Mar 2019
Microsoft promotes zero-trust security over firewalls
Microsoft told RSA Conference attendees a zero-trust model is better than firewalls for protecting corporate data -- a stance that some said doesn't go far enough. Continue Reading
-
News
06 Mar 2019
Cisco: Network security strategy requires IT, OT to play nice
Cisco told RSA attendees the need for network security on the factory floor is growing. Cisco says cooperation between IT and operations is key to protecting equipment. Continue Reading
-
Answer
25 Feb 2019
How does security for intent-based networking work?
Monitoring plays an essential role when it comes to security in intent-based networking environments, as it ensures policies are met and detects network anomalies. Continue Reading
-
Tip
25 Feb 2019
How to improve network security in 5 steps
The basics of network security start with a proactive and comprehensive audit of connectivity points. Also, be sure to get end users involved with network security policies. Continue Reading
-
Answer
11 Feb 2019
What are the pros and cons of machine learning in network security?
The predictive nature of machine learning can benefit network security strategies. But it can also benefit those looking to break through secure network barriers. Continue Reading
-
Tip
01 Feb 2019
Have newer security methods made NAC systems obsolete?
While newer security methods, like microsegmentation and software-defined perimeter, diminish the role of network access control, NAC systems can still help secure the network edge. Continue Reading
-
Answer
10 Jan 2019
What is a software-defined perimeter, and do I need it?
An evolving network world requires evolving network security. Learn how software-defined perimeter offers a compelling answer to network vulnerabilities. Continue Reading
-
Tip
03 Jan 2019
Network security, SD-WAN suppliers revamp branch security
Branch network security is getting a face-lift, as network security and SD-WAN suppliers look at new ways to integrate their platforms and upgrade products. Continue Reading
-
Answer
31 Dec 2018
Which KPIs should I measure for security in SDN?
KPIs provide useful guidelines to measure how network performance and security align with business objectives. Here are some KPIs to help keep track of an SDN environment. Continue Reading
-
Answer
26 Dec 2018
How might NFV in IoT enhance network edge security?
The emergence of IoT devices has considerable network security implications. An NFV architecture, however, could add another layer of network defense. Continue Reading
-
News
05 Dec 2018
Juniper ATP appliance gets broader device support
Juniper has bolstered the security features in its Advanced Threat Prevention product. The vendor also released a Juniper ATP appliance for midsize enterprises. Continue Reading
-
Answer
04 Dec 2018
What are the differences between network security vs. cybersecurity?
IT groups need to consider varying layers of security. For instance, the similarities and differences between cybersecurity and network security are closely entwined. Continue Reading
-
Answer
16 Nov 2018
What are today's top 3 network security challenges?
A significant shortage of cybersecurity staff, poorly configured firewalls and unmanaged end-user mobile devices are some of the top network security threats. Continue Reading
-
Feature
16 Nov 2018
A quick guide to important SDN security issues
Lock down your knowledge of SDN security issues using this compilation that includes expert advice, common pain points and helpful best practices. Continue Reading
-
Tip
09 Nov 2018
NetOps, SecOps, DevOps concepts merge to automate security testing
By adopting DevOps concepts, network teams can automate security testing. But, as development, network and security tasks mingle, some staffing challenges can arise. Continue Reading
-
Tip
07 Nov 2018
Using AI, machine learning in networking to improve analytics
The barrage of alerts modern network analytics tools create is problematic, but the capabilities advanced tech like AI provides can help ease the burden to network operations. Continue Reading
-
Answer
02 Nov 2018
How do last-mile connections work for SD-WAN deployments?
SD-WAN technology plays well with existing last-mile connections, and it allows enterprises to use more than one type of transport link. But beware of provider sprawl. Continue Reading
-
Tip
29 Oct 2018
11 common wireless security risks you don't have to take
Wi-Fi is a boon to productivity, but it can also create serious security issues. Learn how any company can uncover and fortify their wireless security setup. Continue Reading
-
Answer
24 Oct 2018
What is a long-tail DoS threat, and how does it target web apps?
Fine-grained application monitoring can defend against a long-tail DoS threat. This new kind of vulnerability manipulates service queues within a web application. Continue Reading
-
News
12 Oct 2018
ONUG conference to highlight cybersecurity and data protection
At the ONUG fall conference on Oct. 22 to 23, attendees will learn how enterprises can secure assets in a digital economy and how automation, cybersecurity and data protection fit in. Continue Reading
-
News
11 Oct 2018
Patched MikroTik router vulnerability worse than initially thought
Tenable Research finds new exploits of an already patched MikroTik router vulnerability that could enable hackers to launch remote code execution attacks. Continue Reading
-
Blog Post
03 Oct 2018
Palo Alto Networks adds cloud analytics with RedLock acquisition
It's fair to say the cloud has become a core component of most organizations' IT strategies. The growth of public cloud services -- such as Amazon Web Services (AWS), Microsoft Azure and Google ... Continue Reading
-
News
27 Sep 2018
Network security challenges remain a top concern for IT pros
In networking news, security remains a top concern for IT pros; ExtraHop integrates with Microsoft Azure; and Barefoot Networks unveils developer tools for programmable ASICs. Continue Reading
-
News
17 Sep 2018
Are SD-WAN security concerns warranted?
Networking analysts and engineers examine SD-WAN security concerns, the importance of cabling in wireless environments and a new security attack that's difficult to detect. Continue Reading
-
News
30 Aug 2018
VMware takes NSX security to AWS workloads
VMware has brought NSX microsegmentation to workloads running on Amazon Web Services. Also, at VMworld 2018, VMware said NSX security is now enforceable on Arista switches. Continue Reading
-
Tip
22 Aug 2018
How has software-defined networking security evolved?
Software-defined networking security means more than just microsegmentation. Enterprises can also use SDN to assign security zones, improve monitoring and help with automation. Continue Reading
-
Tip
22 Aug 2018
Find network security vulnerabilities by assessing risk
IT staff needs to regularly review network security vulnerabilities and security gaps to battle rising cybersecurity breaches and keep costs under control through risk assessments. Continue Reading
-
News
03 Aug 2018
Cisco bolsters cloud security with Duo acquisition
Cisco has bought Duo Security to add its two-step authentication services to Cisco's cloud-based security offerings. Cisco plans to close the Duo acquisition by October. Continue Reading
-
Tip
02 Aug 2018
How hackers use idle scans in port scan attacks
Hackers exploit port scan attacks to mask their identities before launching an attack. One of their favorites: the idle scan. Continue Reading
-
Opinion
23 Jul 2018
New details released on Huawei's intent-based network
ZK Research offers details on Huawei's new Intent-Driven Network and what its hardware and the software can do to smooth network glitches and even raise security. Continue Reading
-
Tip
18 Jul 2018
Understanding the exploit market: How data breaches happen
When you understand how data breaches happen, applying software patches quickly is crucial to minimize your chances of being on the wrong end of the ever-faster exploit market. Continue Reading
-
Tip
05 Jul 2018
Four ways to improve network security for modern networks
The green padlock on websites doesn't improve network security, so our expert addresses four ways to secure the modern network that move beyond the castle-wall analogy. Continue Reading
-
News
26 Jun 2018
Tempered Networks extends reach of NAC software
Tempered Networks has extended the reach of its network access control technology. The company has introduced NAC software for IoT, Google Cloud and Microsoft Azure. Continue Reading