Network Security

Network Security | News, how-tos, features, reviews, and videos

cyber security and data protection businesswoman using modern screen picture id1363467852
network security digital internet firewall binary code

A firmware message appears on a circuit board.

Researchers show techniques for malware persistence on F5 and Citrix load balancers

Tests show that deploying malware in a persistent manner on load balancer firmware is within reach of less sophisticated attackers.

post 3 image how hardened vms can help with cloud security 1

Cisco adds a firewall, upgrades security

Cisco launches a Secure Firewall for hybrid workers and adds data-loss prevention and passwordless authentication to security products.

iot concept communication network picture id1184826015

Tips on securing IoT devices gleaned from enterprises that use them

IoT devices pose significant threats to enterprises because of lack of visibility into what devices are on enterprise networks and inadequate use of monitoring tools to watch for malicious behaviors.

iot internet of things chains security by mf3d getty

Portnox adds IoT fingerprinting to network access control service

The IoT fingerprinting feature will allow companies to fully identify IoT devices that don't have the storage or processing capabilities to communicate complete identifying information such as model number, or even device type.

Access control setting on a virtual display [authentication/privileges]

Software-defined perimeter: What it is and how it works

With strict authentication enforced by microsegmentation, software-defined perimeter can support Zero Trust Network Access.

SD-WAN adoption

Cisco expands its SD-WAN software for wider reach, better security

Cisco SD-WAN software adds encrypted site-to-cloud connectivity; expands its ability to support multi-region fabric deployment, and improves security.

zero trust

Axis adds automation, onboarding features to Atmos ZTNA network access software

Axis is also offering migration tools and a buyback program for those looking to move from legacy ZTNA (zero trust network access) applications.

globe network businessman abstract

Network security depends on two foundations you probably don’t have

Before adding more layers to network security, consider the benefits of explicit network permission, backed by AI-driven traffic analysis.

network security lock padlock breach

4 ways to better secure your network infrastructure

Must-do initiatives include eliminating generic credentials, regularly auditing IT admin accounts, and deploying MFA for infrastructure access.

digital fabric

Juniper upgrades management platform, adds a switch

Juniper has added troubleshooting features to its flagship Mist AI/ML cloud-based management platform and announced the EX4100 Series Ethernet access switch.

cisco logo fit

Cisco reports vulnerabilities in products including email and web manager

New vulnerabilities found in Cisco internal testing allow remote access and scripting that could lead to the loss of sensitive user data.

Cybersecurity

RSA: Intel reference design to accelerate SASE, other security tasks

Intel says its reference design will enable accelerator cards to offload security processing from server CPUs without requiring more rack space.

Tech Spotlight   >   Cloud [CSO]   >   Conceptual image of laptop users with cloud security overlay.

RSA: Cisco launches SASE, offers roadmap for other cloud-based services

New Cisco services aim to simplify security operations with new as-a-service offerings.

12 zero trust

Who is selling Zero Trust Network Access (ZTNA) and what do you get?

Vendors are offering cloud-based services that support the ZTNA framework for VPN replacement and access control policy enforcement

wireless security vulnerability

6G cellular doesn’t exist, but it can be hacked

Academic researchers have found a way to eavesdrop on 6G wireless transmissions using common, inexpensive, off-the-shelf components.

5G mobile wireless network

U.S. government proposals spell out 5G security advancements

A joint proposal from federal cybersecurity and defense agencies defines a process for ensuring the security of 5G networks.

HYAS brings security threat detection, response to production networks

HYAS Confront uses domain expertise and proprietary machine learning to monitor and detect anomalies in production network environments and improve visibility as applications move to the cloud.

network security lock padlock breach

SASE or SSE? Don’t let hype distract from enterprise needs

Not every vendor can deliver full SASE, and that's OK. Not every enterprise wants, needs or can implement it.

Load More