Network Security

Network Security | News, how-tos, features, reviews, and videos

cso security access granted breach hack identity theft gettyimages 1191670668 by reklamlar 2400x160
United States Capitol Building / Congress / legislation in a digital landscape

micro segmentation security lock binary network 2400x1600

How the network can support zero trust

Zero trust architecture calls for granting just enough access to network resources so individuals can accomplish their work tasks – nothing more – and the network itself can help.

network security lock padlock breach collaboration

How NDR protects your network from cyberthreats

Three steps to finding a network detection and response product that prevents, detects, investigates, identifies, responds and mitigates cyberattacks.

broken lock amid binary code and circuits

Is enterprise security broken?

Deploying independent endpoint or network security separately is coming to a rapid – and much-needed -- end. If you want to stay secure longer-term, focus on unifying your security products now.

CSO > breakthrough / penetration testing / sledgehammer breaking through a binary wall

Release the monkey! How Infection Monkey tests network security

This free, open source penetration testing tool uses real attacks and real techniques to try and exploit its way into a network.

secure system / network security policy management

Review: SaltStack brings SecOps to network orchestration and automation

SaltStack Enterprise, and its optional SecOps modules, is one of the only platforms available today that can fully manage complex enterprise environments while also protecting them.

ipsecurity protocols network security vpn2

Recent VPN hacks reveal transparency issues within the industry and its supply chain

It’s time VPN vendors start minding their own kitchen before they burn the whole house down.

Blue Hexagon network security

Secure SD-WAN: The security vendors and their SD-WAN offerings

A networking vendor simply can’t jump into this space. Some SD-WANs add stateful packet filters and call this security.

network security lock padlock breach

SASE: Redefining the network and security architecture

Adoption of SASE reduces complexity and overhead, improves security and boosts application performance.

firewall network security lock padlock cyber security

The evolution to Secure Access Service Edge (SASE) is being driven by necessity

The users and devices are everywhere. As a result, secure access services also need to be everywhere.

secure system / network security policy management

Can microsegmentation help IoT security?

Deploying microsegmentation as part of a broad IoT security strategy can enable more granular control of network systems and better isolation if a security flaw is exploited.

Computerworld - Scary Tech [Slide-05] - Encryption systems with backdoors

Flaw found in Supermicro motherboards could allow for remote hijacking

Eclypsium discovered a vulnerability in three generations of Supermicro motherboards that could allow an attacker to remotely commandeer the server. A fix is already available.

ikea tradfri led smart filament bulb 2

Mellanox introduces SmartNICs to eliminate network load on CPUs

Mellanox unveiled two processors designed to offload network workloads from the CPU -- ConnectX-6 Dx and BlueField-2 – freeing the CPU to do its processing job.

distributed / decentralized global network / globe / Africa

How SD-Branch addresses today’s network security concerns

New digital technologies such as IoT at remote locations increase the need to ID devices and monitor network activity. That’s where SD-Branch can help, says Fortinet’s John Maddison.

cybersecurity eye with binary face recognition abstract eye

Is your enterprise software committing security malpractice?

ExtraHop discovered enterprise security and analytic software are "phoning home" and quietly uploading information to servers outside of customers' networks.

network security hacker virus crime

Tempered Networks simplifies secure network connectivity and microsegmentation

Tempered Networks’ IDN platform uses the Host Identity Protocol to partition and isolate the network into trusted microsegments, providing an easy and cost-effective way to secure the network.

Chains of binary data.

With net neutrality repealed, how blockchain-based networking can protect online privacy

VPNs may not offer enough protection.

networking model

Allied Telesis turns its networking focus to the U.S. market

While big names like Cisco and Juniper dominate the enterprise networking landscape, Allied Telesis quietly brings 30 years of experience and innovation to the market.

millennials trust

How Akamai implemented a zero-trust model

An effort that was triggered by a nation-state attack nine years ago has fundamentally transformed how people and devices access apps and services, limiting damage from lateral movement.

Load More