Network Security
Network Security | News, how-tos, features, reviews, and videos
How NDR protects your network from cyberthreats
Three steps to finding a network detection and response product that prevents, detects, investigates, identifies, responds and mitigates cyberattacks.
Is enterprise security broken?
Deploying independent endpoint or network security separately is coming to a rapid – and much-needed -- end. If you want to stay secure longer-term, focus on unifying your security products now.
Release the monkey! How Infection Monkey tests network security
This free, open source penetration testing tool uses real attacks and real techniques to try and exploit its way into a network.
Review: SaltStack brings SecOps to network orchestration and automation
SaltStack Enterprise, and its optional SecOps modules, is one of the only platforms available today that can fully manage complex enterprise environments while also protecting them.
Recent VPN hacks reveal transparency issues within the industry and its supply chain
It’s time VPN vendors start minding their own kitchen before they burn the whole house down.
Secure SD-WAN: The security vendors and their SD-WAN offerings
A networking vendor simply can’t jump into this space. Some SD-WANs add stateful packet filters and call this security.
SASE: Redefining the network and security architecture
Adoption of SASE reduces complexity and overhead, improves security and boosts application performance.
The evolution to Secure Access Service Edge (SASE) is being driven by necessity
The users and devices are everywhere. As a result, secure access services also need to be everywhere.
Can microsegmentation help IoT security?
Deploying microsegmentation as part of a broad IoT security strategy can enable more granular control of network systems and better isolation if a security flaw is exploited.
Flaw found in Supermicro motherboards could allow for remote hijacking
Eclypsium discovered a vulnerability in three generations of Supermicro motherboards that could allow an attacker to remotely commandeer the server. A fix is already available.
Mellanox introduces SmartNICs to eliminate network load on CPUs
Mellanox unveiled two processors designed to offload network workloads from the CPU -- ConnectX-6 Dx and BlueField-2 – freeing the CPU to do its processing job.
How SD-Branch addresses today’s network security concerns
New digital technologies such as IoT at remote locations increase the need to ID devices and monitor network activity. That’s where SD-Branch can help, says Fortinet’s John Maddison.
Is your enterprise software committing security malpractice?
ExtraHop discovered enterprise security and analytic software are "phoning home" and quietly uploading information to servers outside of customers' networks.
Tempered Networks simplifies secure network connectivity and microsegmentation
Tempered Networks’ IDN platform uses the Host Identity Protocol to partition and isolate the network into trusted microsegments, providing an easy and cost-effective way to secure the network.
With net neutrality repealed, how blockchain-based networking can protect online privacy
VPNs may not offer enough protection.
Allied Telesis turns its networking focus to the U.S. market
While big names like Cisco and Juniper dominate the enterprise networking landscape, Allied Telesis quietly brings 30 years of experience and innovation to the market.
How Akamai implemented a zero-trust model
An effort that was triggered by a nation-state attack nine years ago has fundamentally transformed how people and devices access apps and services, limiting damage from lateral movement.
Protecting smart cities and smart people
In the ramp-up to a smart cities utopia, many societal concerns are often left overlooked when in truth, trust and privacy need to define the future role of cybersecurity.
-
White Paper
-
Video/Webcast
Sponsored -
Video/Webcast
Sponsored -
White Paper
-
White Paper