Network Security

Network Security | News, how-tos, features, reviews, and videos

Chains of binary data.
big data / data center / server racks / storage / binary code / analytics

network security lock and cables

National pen test execution standard would improve network security

Inconsistent penetration test procedures create gaps and leave vulnerabilities open. A national test execution standard could fix that and ensure networks are equally secure.

big data code binary tunnel

DARPA explores new computer architectures to fix security between systems

A completely new government-developed computer architecture could ultimately lead to widespread, commercial-oriented data-security fixes as information moves between systems.

firewall

What is a firewall? How they work and how they fit into enterprise security

Firewalls are the primary perimeter defense for most organizations that have gone through many iterations: proxy, stateful, Web app, next-generation

network security lock padlock breach

How SD-WAN can improve your security strategy

SD-WAN introduces new security options, not previously available with legacy networking technologies, that make it easier to manage and secure network traffic.

network security lock padlock breach

Can TLS 1.3 and DNSSEC make your network blind?

DNS & ISN encryption are likely to present numerous problems to the network operations, optimization and SD-WAN vendors.

network security hacker virus crime

Netsurion eases networking and security challenges

Netsurion combines networking, security and compliance in one solution delivered from the cloud, reducing the need for point solutions and simplifying network and security operations.

networking background

Zero-trust security adds necessary ingredients

Let's face it: VPNs are no longer in vogue. Users do not want to spend the time setting them up, and network admins are increasingly moving to a zero-trust model, which ensures a high level of security while empowering users to work...

wireless security vulnerability

5G and 6G wireless technologies have security issues

5G and 6G wireless network technologies promise faster speeds and greater reliability, but they have security issues that must be addressed before they launch, researchers say.

Data matrix networking connections system

Introducing Named Data Networking

No more IP addresses.

padlock on ethernet cables for secure network

Identity awareness: it’s more than just a packet

Routing must reflect business context.

orange monitors with lock icon network security cyber threat

The WAF backed by artificial intelligence (AI)

Web application firewalls backed by artificial intelligence and machine learning are beginning to surface as major successes against DDoS attacks and the application DDoS world.

shadow over three people walking on the street 116466615

Zero Trust Networking (ZTN): don’t trust anything

I don’t even want you to knock on my door! Let’s craft a new story.

network security locks and cables

Security serves as an essential component to growing an enterprise with SD-WAN

Adopting productivity-enhancing applications across the network creates a need for dynamic data protection. What decision makers should understand about the intersection of security and SD-WAN and keeping data not only accessible, but...

network / data center

What is Nmap? Why you need this network mapper

While there is a wealth of monitoring tools available to network administrators for port scanning and network mapping, Nmap is the de facto standard. Here's why.

number 4 four film strip

4 ways to avoid cloud outages and improve system performance

Cloud providers can fall victim to outages just like anyone else. Here are some straightforward steps you can take to keep IT systems up, running and secure.

smart cities iot binary skyline city buildings

Quantum-secured network ‘virtually un-hackable’

A U.K.-based broadband supplier has completed a quantum-key distribution (QKD) secured fiber internet link that it says hackers can't penetrate.

ddos attack

The rise of artificial intelligence DDoS attacks

The leaves may change color, but the roots are the same. Are you ready for AI-based DDoS attacks?

network security locks and cables

OPAQ enables total network security from the cloud

OPAQ built a global network infrastructure and embedded enterprise-grade security services that even extend to an organization’s endpoints.

Load More