Network Security

Network Security news, trend analysis and opinion

cisco devnet
lock binary circuits

network security digital internet firewall binary code

Cato Networks adds threat hunting to its Network as a Service

Security is a key benefit of using cloud-based networking services. And Cato Networks is kicking it up a notch by adding threat hunting as a service to its cloud network.

window patch repair boarded up

Overcoming kludges to secure web applications

Nothing is easy when applications lay upon multiple kludges of network architecture and flawed protocols. Without adequate safeguards, security results in a hit and miss approach.

man in network room data center tech troubleshooting

IPSec – A swiss army knife of kludges

One shoe does not fit all when it comes to SD-WAN providers. There are a variety of ways to tunnel user traffic. Stay clear of anyone who hasn't made the right extensions to IPSec.

cubes - blocks - squares - containers

Container security: crafting application identity

Containers are not like traditional workloads and as a result, they require a new security model. Traditional methods such as IP address and ACLs are no longer effective.

next generation firewalls
video

How have network firewalls evolved?

Firewalls have become ubiquitous across the enterprise IT landscape because of their proven ability to stop bad traffic from entering corporate networks and protect a company’s most valuable assets. So how have firewalls evolved over...

internet tubes

Internet exchange points team up to bring better MANRS to the internet

Enterprises stand to benefit from ISOC's latest campaign to get IXPs to clean up internet routing security

adrian sanabria
video

Is it time to kill the pen test? | Salted Hash Ep 22

Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Adrian Sanabria, director of research at Savage Security, about de-emphasizing network penetration tests to put more focus on attack simulations and helping...

the three stooges

What Larry, Moe and Curly can teach us about network security and SD-WAN agility

A recent survey of 712 IT professionals shows that network complexity remains a problem even after deploying SD-WAN.

cloud computing - public, private; open, locked

Leveraging reconfigurable computing for smarter cybersecurity, part 2

It’s clear that reconfigurable computing platforms have a great deal to offer in enabling faster, more powerful and more responsive cybersecurity solutions, both now and in the future.

cyber kill chain
video

What is the cyber kill chain?

Concerned about your network defense? Watch this short video to learn the 7 stages of the cyber kill chain, a framework created by Lockheed Martin to outline the phases of a targeted cyberattack.

network security primary2

Warning: security vulnerabilities found in SD-WAN appliances

Our branch appliances are often exposed to “innocent” threats, such as being inadvertently disabled by third-party sales engineer. And even worse, they can be exposed to truly sensitive data.

How VDI can help organizations be more secure

The use cases for VDI have exploded in the face of today’s modern, mobile workforce.

Internet of things face

Don’t get caught in an IoT security nightmare

In the rush to connect every possible thing to powerful insight-generating capabilities in the cloud, Organizations should not fail to carefully evaluate and secure every component of the IoT ecosystem.

man with online security key

The 4 SD-WAN architectures for network security

SD-WAN’s future lies in security.

abstract wireless communication network

6 AI ingredients every wireless networking strategy needs

Thanks to advances in AI, companies of all sizes can transform their wireless networking with WiFi that is predictable, reliable and measurable.

firewall

What is a firewall? [And how about next-generation firewalls?]

Network firewalls are the primary perimeter defense for most organizations. Here's a look at the different types - proxy, stateful, next-gen (NGFW), Web apps - and their features.

cisco logo

Cisco continues its network-based security strategy by moving to acquire Observable Networks

The acquisition target provides dynamic network behavior monitoring to help security teams find anomalies that could indicate a breach.

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

Load More