Network Security

Network Security | News, how-tos, features, reviews, and videos

Blue Hexagon network security
network security lock padlock breach

firewall network security lock padlock cyber security

The evolution to Secure Access Service Edge (SASE) is being driven by necessity

The users and devices are everywhere. As a result, secure access services also need to be everywhere.

secure system / network security policy management

Can microsegmentation help IoT security?

Deploying microsegmentation as part of a broad IoT security strategy can enable more granular control of network systems and better isolation if a security flaw is exploited.

Computerworld - Scary Tech [Slide-05] - Encryption systems with backdoors

Flaw found in Supermicro motherboards could allow for remote hijacking

Eclypsium discovered a vulnerability in three generations of Supermicro motherboards that could allow an attacker to remotely commandeer the server. A fix is already available.

ikea tradfri led smart filament bulb 2

Mellanox introduces SmartNICs to eliminate network load on CPUs

Mellanox unveiled two processors designed to offload network workloads from the CPU -- ConnectX-6 Dx and BlueField-2 – freeing the CPU to do its processing job.

distributed / decentralized global network / globe / Africa

How SD-Branch addresses today’s network security concerns

New digital technologies such as IoT at remote locations increase the need to ID devices and monitor network activity. That’s where SD-Branch can help, says Fortinet’s John Maddison.

cybersecurity eye with binary face recognition abstract eye

Is your enterprise software committing security malpractice?

ExtraHop discovered enterprise security and analytic software are "phoning home" and quietly uploading information to servers outside of customers' networks.

network security hacker virus crime

Tempered Networks simplifies secure network connectivity and microsegmentation

Tempered Networks’ IDN platform uses the Host Identity Protocol to partition and isolate the network into trusted microsegments, providing an easy and cost-effective way to secure the network.

Chains of binary data.

With net neutrality repealed, how blockchain-based networking can protect online privacy

VPNs may not offer enough protection.

networking model

Allied Telesis turns its networking focus to the U.S. market

While big names like Cisco and Juniper dominate the enterprise networking landscape, Allied Telesis quietly brings 30 years of experience and innovation to the market.

spinning globe smart city iot skyscrapers city scape internet digital transformation

Protecting smart cities and smart people

In the ramp-up to a smart cities utopia, many societal concerns are often left overlooked when in truth, trust and privacy need to define the future role of cybersecurity.

broken chain metal link breach security

Gov’t warns on VPN security bug in Cisco, Palo Alto, F5, Pulse software

VPN packages from Cisco, Palo Alto, F5 and Pulse may improperly secure tokens and cookies, allowing nefarious actors an opening to invade and take control over an end user’s system.

firewall network security lock padlock cyber security

Meta Networks builds user security into its Network-as-a-Service

Meta Networks has a unique approach to the security of its Network-as-a-Service. A tight security perimeter is built around every user and the specific resources each person needs to access.

ipsecurity protocols network security vpn3

Software-defined perimeter: Identity-centric enforced network perimeter

Traditional VPNs no longer cut it.

firewall network security lock padlock cyber security

Software-defined perimeter brings trusted access to multi-cloud applications, network resources

Today’s networks are both elastic and permeable. Software-defined perimeter (SDP) technology enables simpler, trusted, and secure access to applications in public or private cloud.

Chains of binary data.

Why blockchain may be blockchain’s best cybersecurity option

With new and emerging security threats to blockchain projects, it's time to consider building decentralized security applications.

big data / data center / server racks / storage / binary code / analytics

Named data networking: names the data instead of data locations

Will NDN kill the cloud, just like content delivery networks (CDN) kill latency?

network security lock and cables

National pen test execution standard would improve network security

Inconsistent penetration test procedures create gaps and leave vulnerabilities open. A national test execution standard could fix that and ensure networks are equally secure.

big data code binary tunnel

DARPA explores new computer architectures to fix security between systems

A completely new government-developed computer architecture could ultimately lead to widespread, commercial-oriented data-security fixes as information moves between systems.

Load More