Network Security

Network Security | News, how-tos, features, reviews, and videos

Conceptual binary vault security mechanism.
Zero trust Netskope

digital security concept picture id1185245180

Cisco CEO: There's no enterprise perimeter to defend anymore

At RSA, Cisco announces new features for SecureX, Secure Endpoint, and Umbrella, plus integration between Cisco/Meraki Wi-Fi and Cisco SD-WAN

keys authentication

How does certificate-based authentication work?

The subject that does not have to be scary, but there are a few misunderstandings. Here's a look at how certificate-based authentications actually works.

secure data network digital cloud computing cyber security concept picture id1157887211 2

Juniper takes SASE security control to the cloud

Juniper is rolling out Security Director Cloud to provide a central point of management for enterprise security management.

8 authentication basics password identity protected security

802.1X: What you need to know about this LAN-authentication standard

The IEEE 802.1X standard integrates enterprise authentication into wired or wireless LANs.

smart home

VMware bundles support for the branch-of-one workforce

VMware's new Anywhere Workspace packages networking, SASE, cloud security, and access control.

open faucets leaking binary streams of data

Water-authority network upgrade spots problems faster

The need for greater visibility into remote systems helped prompt a large-scale network upgrade for the Albuquerque Bernalillo County Water Utility Authority.

CSO > IoT / Internet of Things, unencrypted/unsecured/vulnerable

TCP/IP stack vulnerabilities threaten IoT devices

The latest in a long line of vulnerabilities in a key part of the networking stack threatens a major open-source operating system, printers and medical IoT devices.

internet cyber security picture id476036529

Cisco streamlines, upgrades its SASE bundle

Cisco is making it simpler to buy its SASE offerings, adding passwordless authentication, and helping to customize the package through a SASE channel in its DevNet software-developer community.

cloud security expert casb binary cloud computing cloud security by metamorworks getty

Cloudflare wants to be your corporate network backbone with centralized management and security

Magic WAN and Magic Firewall aim to simplify linking sites and datacenters while allowing organizations to better enforce security policies.

CSO > cloud computing / backups / data center / server racks / data transfer

Top enterprise data-center trends you need to know

Enterprise data-center pros are embracing cloud services, growing high-speed networks, enabling remote workforces, and adopting automation and AI.

One lock in a series is unlocked / weakness / vulnerability

5 free network-vulnerability scanners

These 5 tools can help automate the detection and remediation of vulnerabilities, and they're available at no cost, and some are upgradeable to more fully featured platforms.

Tech Spotlight   >   Cybersecurity [NW]   >   Cloud network security

WAN challenges steer auto-rental firm to SASE

SASE helps global car-rental company Sixt strengthen its network security architecture and ride out COVID-19 challenges.

Tech Spotlight   >   Cybersecurity [CSO]   >   Hands cradle an abstract, virtual security matrix.

Cybersecurity in 2021: Stopping the madness

The challenges are greater than ever. But security pros have learned a lot – and with luck, the right strategic defenses can help even the highest-value targets withstand severe attacks.

cso security access granted breach hack identity theft gettyimages 1191670668 by reklamlar 2400x160

Cisco issues 3 critical warnings around ACI, NS-OX security holes

Cisco issued three security advisories rated “critical” for some of its high-end software systems – two aimed at its Application Services Engine (ASE) implementation and one at the NX-OS operating system. The most concerning warning...

United States Capitol Building / Congress / legislation in a digital landscape

Lessons that insurrection selfies hold for legitimate enterprises

While electronic metadata is helping law enforcement track those who assaulted Congress, existence of that data should be noted by businesses concerned about privacy.

micro segmentation security lock binary network 2400x1600

How the network can support zero trust

Zero trust architecture calls for granting just enough access to network resources so individuals can accomplish their work tasks – nothing more – and the network itself can help.

network security lock padlock breach collaboration

How NDR protects your network from cyberthreats

Three steps to finding a network detection and response product that prevents, detects, investigates, identifies, responds and mitigates cyberattacks.

broken lock amid binary code and circuits

Is enterprise security broken?

Deploying independent endpoint or network security separately is coming to a rapid – and much-needed -- end. If you want to stay secure longer-term, focus on unifying your security products now.

Load More