Network Security

Network Security | News, how-tos, features, reviews, and videos

zero trust
globe network businessman abstract

network security lock padlock breach

Are you doing enough to secure your network infrastructure?

Must-do initiatives include eliminating generic credentials, regularly auditing IT admin accounts, and deploying MFA for infrastructure access.

digital fabric

Juniper upgrades management platform, adds a switch

Juniper has added troubleshooting features to its flagship Mist AI/ML cloud-based management platform and announced the EX4100 Series Ethernet access switch.

cisco logo fit

Cisco reports vulnerabilities in products including email and web manager

New vulnerabilities found in Cisco internal testing allow remote access and scripting that could lead to the loss of sensitive user data.

Cybersecurity

RSA: Intel reference design to accelerate SASE, other security tasks

Intel says its reference design will enable accelerator cards to offload security processing from server CPUs without requiring more rack space.

Tech Spotlight   >   Cloud [CSO]   >   Conceptual image of laptop users with cloud security overlay.

RSA: Cisco launches SASE, offers roadmap for other cloud-based services

New Cisco services aim to simplify security operations with new as-a-service offerings.

12 zero trust

Who is selling Zero Trust Network Access (ZTNA) and what do you get?

Vendors are offering cloud-based services that support the ZTNA framework for VPN replacement and access control policy enforcement

wireless security vulnerability

6G cellular doesn’t exist, but it can be hacked

Academic researchers have found a way to eavesdrop on 6G wireless transmissions using common, inexpensive, off-the-shelf components.

5G mobile wireless network

U.S. government proposals spell out 5G security advancements

A joint proposal from federal cybersecurity and defense agencies defines a process for ensuring the security of 5G networks.

HYAS brings security threat detection, response to production networks

HYAS Confront uses domain expertise and proprietary machine learning to monitor and detect anomalies in production network environments and improve visibility as applications move to the cloud.

network security lock padlock breach

SASE or SSE? Don’t let hype distract from enterprise needs

Not every vendor can deliver full SASE, and that's OK. Not every enterprise wants, needs or can implement it.

network / data center

What is Nmap and why do you need it on your network?

While there are many monitoring tools available to network administrators for port scanning and network mapping, Nmap is the de facto standard. Here's why.

A magnifying lens exposes an exploit amid binary code.

CISA issues emergency warning over two new VMware vulnerabilities

The U.S. Cybersecurity and Infrastructure Agency issues emergency security directive over VMware vulnerabilities CVE-2022-22972 and CVE-2022-22973, which threat actors are likely to exploit.

database data center network security

6 top network security threats and how to beat them

Here's a list of the most insidious external security threats and internal vulnerabilities, and how to successfully protect the network against both

smart city iot digital transformation networking wireless city scape skyline

Intel details IPU roadmap to free up CPUs

Intel unveiled plans for its next-gen infrastructure processing units (IPU) at its inaugural Intel Vision event.

Leading remote teams  >  A businessman virtually works with a distributed network of teams.

Cisco warns of critical vulnerability in virtualized network software

Multiple vulnerabilities have been discovered in Cisco's Enterprise NFV Infrastructure Software (NFVIS), the worst of which could let an attacker escape from the guest virtual machine (VM) to the host machine.

A binary mask.

Cisco urges software update to thwart counterfeit switches

Semiconductor material shortages and other supply chain disruptions are contributing to a spike in counterfeit IT gear, Cisco warns.

security system vulnerabilities - a grid of locks with several unlocked

TLS implementation flaws open Aruba and Avaya network switches to RCE attacks

The network switch vulnerabilities are considered critical and could allow attackers to break network segmentation, exfiltrate data, and escape captive portals.

network security / network traffic scanning

Basing network security on IP addressing: Would it be worth it?

Rather than layering security onto networks, the networks and carefully managed authorization policies can hinder attacks, but at an administrative cost.

Load More