Network Security

Network Security | News, how-tos, features, reviews, and videos

shadow over three people walking on the street 116466615
network security locks and cables

network / data center

What is Nmap? Why you need this network mapper

While there is a wealth of monitoring tools available to network administrators for port scanning and network mapping, Nmap is the de facto standard. Here's why.

number 4 four film strip

4 ways to avoid cloud outages and improve system performance

Cloud providers can fall victim to outages just like anyone else. Here are some straightforward steps you can take to keep IT systems up, running and secure.

smart cities iot binary skyline city buildings

Quantum-secured network ‘virtually un-hackable’

A U.K.-based broadband supplier has completed a quantum-key distribution (QKD) secured fiber internet link that it says hackers can't penetrate.

ddos attack

The rise of artificial intelligence DDoS attacks

The leaves may change color, but the roots are the same. Are you ready for AI-based DDoS attacks?

network security locks and cables

OPAQ enables total network security from the cloud

OPAQ built a global network infrastructure and embedded enterprise-grade security services that even extend to an organization’s endpoints.

mobile security / unlocked data connections

Protecting iOS against the aLTEr attacks

The new aLTEr attack can be used against nearly all LTE connected endpoints by intercepting traffic and redirecting it to malicious websites. This article summarizes how the attack works, and suggests ways to protect yourself from it...

network security primary2

Networking anomalies

Total network security is nearly impossible. Use anomalies to mitigate the damage.

smart cities iot binary skyline city buildings industrial iot

Identifying the Internet of Things – one device at a time

To securely build and grow an IoT ecosystem, one must have the tools and architectures in place to identify, control and manage their IoT devices. This process begins with establishing a strong identity within each IoT device. Here...

network security locks and cables

Pulse Secure VPN enhanced to better support hybrid IT environments

Thanks to more than 100 enhancements, Pulse Connect Secure can better support BYOD and hybrid IT environments where applications are in the data center and in the cloud.

cisco devnet

Cisco CEO Chuck Robbins: Get ready for the network's next act

At Cisco Live, CEO Chuck Robbins outlines Cisco’s vision for the future of networking -- and it’s never been brighter.

lock binary circuits

Automation critical to scalable network security

With Tufin Orchestration Suite R18-1, Cisco Firepower customers can make changes and update all the firewalls in minutes instead of having to touch each box one at a time.

network security digital internet firewall binary code

Cato Networks adds threat hunting to its Network as a Service

Security is a key benefit of using cloud-based networking services. And Cato Networks is kicking it up a notch by adding threat hunting as a service to its cloud network.

window patch repair boarded up

Overcoming kludges to secure web applications

Nothing is easy when applications lay upon multiple kludges of network architecture and flawed protocols. Without adequate safeguards, security results in a hit and miss approach.

man in network room data center tech troubleshooting

IPSec – A swiss army knife of kludges

One shoe does not fit all when it comes to SD-WAN providers. There are a variety of ways to tunnel user traffic. Stay clear of anyone who hasn't made the right extensions to IPSec.

cubes - blocks - squares - containers - storage - repository

Container security: crafting application identity

Containers are not like traditional workloads and as a result, they require a new security model. Traditional methods such as IP address and ACLs are no longer effective.

next generation firewalls
video

How have network firewalls evolved?

Firewalls have become ubiquitous across the enterprise IT landscape because of their proven ability to stop bad traffic from entering corporate networks and protect a company’s most valuable assets. So how have firewalls evolved over...

internet tubes

Internet exchange points team up to bring better MANRS to the internet

Enterprises stand to benefit from ISOC's latest campaign to get IXPs to clean up internet routing security

adrian sanabria
video

Is it time to kill the pen test? | Salted Hash Ep 22

Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Adrian Sanabria, director of research at Savage Security, about de-emphasizing network penetration tests to put more focus on attack simulations and helping...

Load More