Network Security

Network Security news, trend analysis and opinion

cloud computing - public, private; open, locked

network security primary2

Warning: security vulnerabilities found in SD-WAN appliances

Our branch appliances are often exposed to “innocent” threats, such as being inadvertently disabled by third-party sales engineer. And even worse, they can be exposed to truly sensitive data.

How VDI can help organizations be more secure

The use cases for VDI have exploded in the face of today’s modern, mobile workforce.

Internet of things face

Don’t get caught in an IoT security nightmare

In the rush to connect every possible thing to powerful insight-generating capabilities in the cloud, Organizations should not fail to carefully evaluate and secure every component of the IoT ecosystem.

man with online security key

The 4 SD-WAN architectures for network security

SD-WAN’s future lies in security.

abstract wireless communication network

6 AI ingredients every wireless networking strategy needs

Thanks to advances in AI, companies of all sizes can transform their wireless networking with WiFi that is predictable, reliable and measurable.


What is a firewall? [And how about next-generation firewalls?]

Network firewalls are the primary perimeter defense for most organizations. Here's a look at the different types - proxy, stateful, next-gen (NGFW), Web apps - and their features.

cisco logo

Cisco continues its network-based security strategy by moving to acquire Observable Networks

The acquisition target provides dynamic network behavior monitoring to help security teams find anomalies that could indicate a breach.


Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

dashboard analytics stats monitoring

4 resources to find free Cisco skills and certification labs

Cisco offers a wealth of instruction - some of it free - for increasing networking skills or prepping for certification exams.

3 keychain keys

Outsourcing security: Would you turn over the keys to a third party?

Years ago it would have been unthinkable to give up control to securing your most valuable assets. But for some companies the risk of handing the security keys to a third party is less than the idea of facing the daily barrage of...

cybersecurityshutterstock 380217166

Face it: Enterprise cyberattacks are going to happen

There are now so many cyberattacks that many enterprises simply accept that hackers will find ways to break into their systems. Companies are combining new and old methods to thwart the bad guys.

3 sensitive data hacker phone

How to protect your data when using public Wi-Fi

Hackers love public Wi-Fi. Unsuspecting victims often fall into their traps. To protect your data when using public Wi-Fi, follow these four steps.


False positives still cause threat alert fatigue

How you set up and prioritize which alerts to look at and act on is the basis for an effective threat management strategy.

6 updating security software

Report: Top 25 IT security products

Download this exclusive report highlighting 25 top security products – as rated by actual enterprise users of the products – in categories such as cloud security, firewalls, SIEM, application security and IoT security.

human weak link cybersecurity primary

Systemic cybersecurity crisis looms

Executive perception that security is just another cost, implementing bare bones security measures and growing threats could lead to a cybersecurity crisis.

computer ports secure issue

Securing risky network ports

CSO examines risky network ports based on related applications, vulnerabilities, and attacks, providing approaches to protect the enterprise from malicious hackers who misuse these openings.

Family in silhouette waving goodbye at airport

Are we ready to bid the SIEM farewell?

SIEM technology is old, and possibly not properly configured making it vulnerable to attacks.

death of the office telephone

When phone systems attack

Weaknesses in our nation's 911 network continue to expose themselves, mostly by accident. The latest incident was with the 911 system in Amarillo, Texas.

Load More