Network Security

Network Security | News, how-tos, features, reviews, and videos

network security lock padlock breach
network security hacker virus crime

networking background

Zero-trust security adds necessary ingredients

Let's face it: VPNs are no longer in vogue. Users do not want to spend the time setting them up, and network admins are increasingly moving to a zero-trust model, which ensures a high level of security while empowering users to work...

firewall

What is a firewall? How they work and all about next-generation firewalls

Firewalls are the primary perimeter defense for most organizations that have gone through many iterations: proxy, stateful, Web app, next-generation

wireless security vulnerability

5G and 6G wireless technologies have security issues

5G and 6G wireless network technologies promise faster speeds and greater reliability, but they have security issues that must be addressed before they launch, researchers say.

Data matrix networking connections system

Introducing Named Data Networking

No more IP addresses.

padlock on ethernet cables for secure network

Identity awareness: it’s more than just a packet

Routing must reflect business context.

orange monitors with lock icon network security cyber threat

The WAF backed by artificial intelligence (AI)

Web application firewalls backed by artificial intelligence and machine learning are beginning to surface as major successes against DDoS attacks and the application DDoS world.

shadow over three people walking on the street 116466615

Zero Trust Networking (ZTN): don’t trust anything

I don’t even want you to knock on my door! Let’s craft a new story.

network security locks and cables

Security serves as an essential component to growing an enterprise with SD-WAN

Adopting productivity-enhancing applications across the network creates a need for dynamic data protection. What decision makers should understand about the intersection of security and SD-WAN and keeping data not only accessible, but...

network / data center

What is Nmap? Why you need this network mapper

While there is a wealth of monitoring tools available to network administrators for port scanning and network mapping, Nmap is the de facto standard. Here's why.

number 4 four film strip

4 ways to avoid cloud outages and improve system performance

Cloud providers can fall victim to outages just like anyone else. Here are some straightforward steps you can take to keep IT systems up, running and secure.

smart cities iot binary skyline city buildings

Quantum-secured network ‘virtually un-hackable’

A U.K.-based broadband supplier has completed a quantum-key distribution (QKD) secured fiber internet link that it says hackers can't penetrate.

ddos attack

The rise of artificial intelligence DDoS attacks

The leaves may change color, but the roots are the same. Are you ready for AI-based DDoS attacks?

network security locks and cables

OPAQ enables total network security from the cloud

OPAQ built a global network infrastructure and embedded enterprise-grade security services that even extend to an organization’s endpoints.

mobile security / unlocked data connections

Protecting iOS against the aLTEr attacks

The new aLTEr attack can be used against nearly all LTE connected endpoints by intercepting traffic and redirecting it to malicious websites. This article summarizes how the attack works, and suggests ways to protect yourself from it...

network security primary2

Networking anomalies

Total network security is nearly impossible. Use anomalies to mitigate the damage.

smart cities iot binary skyline city buildings industrial iot

Identifying the Internet of Things – one device at a time

To securely build and grow an IoT ecosystem, one must have the tools and architectures in place to identify, control and manage their IoT devices. This process begins with establishing a strong identity within each IoT device. Here...

network security locks and cables

Pulse Secure VPN enhanced to better support hybrid IT environments

Thanks to more than 100 enhancements, Pulse Connect Secure can better support BYOD and hybrid IT environments where applications are in the data center and in the cloud.

cisco devnet

Cisco CEO Chuck Robbins: Get ready for the network's next act

At Cisco Live, CEO Chuck Robbins outlines Cisco’s vision for the future of networking -- and it’s never been brighter.

Load More