Network Security

Network Security | News, how-tos, features, reviews, and videos

Conceptual image of a network labeled 'Zero Trust.'

Network-as-a-service lets a shoe retailer take steps toward Zero Trust

DTLR has gradually moved its retail footwear operations to Cloudflare NaaS for better security, network performance, and predictable costs.

distributed / decentralized network connections across the globe

Extreme adds network fabric support to its SD-WAN

The ExtremeCloud SD-WAN platform gains better automation, streamlined connectivity to AWS and Microsoft Azure clouds.

cloud computing security vulnerability and threat management solutions 3d illustration.jpgs1024x102

Cisco security upgrades strengthen access control, risk analysis

Cisco bolsters Duo to combat MFA fatigue, adds new risk-measuring app, and expands SASE options.

cyber security lock padlock firewall code breach password

Fortinet unveils custom ASIC to boost firewall performance, efficiency

Fortinet’s new custom chip, the FortiSP5, will power its converged network and security devices.

network security lock padlock breach

NTT, Palo Alto partner for managed SASE with AIOps

Using a managed services provider to deliver SASE can streamline deployment and free up enterprise resources.

train tracks converge / rails switch / paths merge / convergence / directory traversals

Enterprises turn to single-vendor SASE for ease of manageability

Getting the full SASE stack of networking and security capabilities from a single vendor can simplify deployment and management, but there are downsides to consider.

hottest and coldest outsourcing trends city globe

Pros and cons of managed SASE

Managed SASE can be appealing for enterprises that want a single provider for deployment and management of WAN and security infrastructure, but there can be tradeoffs depending on provider flexibility, platform interoperability, and...

Quantum computing / security

QuSecure launches quantum-computing based security for endpoints

Quantum-based security with what’s advertised as “frictionless” deployment is now available from QuSecure.

Data center / enterprise networking

Remote.it takes steps toward zero trust with 'single line of code' provisioning

New integration with Okta, containerization support and a tagging system are all present in the latest version of Remote.it’s network management platform.

it as a product box package hand with product technology nodes primary

8 hot networking technologies for 2023

Innovative technologies designed to make networks faster, smarter and more secure

binary code flows around a corporate structure / cybersecurity / technology companies

Former VMware exec Gillis resurfaces to run Cisco security business (again)

Tom Gillis, who left VMware in December, is expected to drive growth in Cisco's cloud, AI and end-to-end security initiatives.

businessman looking through binoculars future vision prediction

Looking ahead to the network technologies of 2023

Virtual networking will drive NaaS evolution, and cloud-hosted security options will explode.

zero trust security model secured network picture id1313494602

What is Zero Trust Network Access?

ZTNA is a security strategy (not a product) that says that all devices and users are considered untrusted until they can be authenticated.

data center female it specialist using laptop server farm cloud and picture id1336250828

Data center networking trends to watch for 2023

Hybrid and multicloud initiatives are driving changes in data center networks, including new security rollouts, greater automation, and evolving netops strategies.

cyber security and data protection businesswoman using modern screen picture id1363467852

Palo Alto targets zero-day threats with new firewall software

PAN 11.0 Nova, the latest version of Palo Alto's firewall operating system, enables upgraded malware sandboxing and ties into the vendor’s new CASB.

network security digital internet firewall binary code

Should security systems be the network?

Small enterprises can get away with using security gear as their network infrastructure, but can larger ones, and is it a good idea?

A firmware message appears on a circuit board.

Researchers show techniques for malware persistence on F5 and Citrix load balancers

Tests show that deploying malware in a persistent manner on load balancer firmware is within reach of less sophisticated attackers.

post 3 image how hardened vms can help with cloud security 1

Cisco adds a firewall, upgrades security

Cisco launches a Secure Firewall for hybrid workers and adds data-loss prevention and passwordless authentication to security products.

iot concept communication network picture id1184826015

Tips on securing IoT devices gleaned from enterprises that use them

IoT devices pose significant threats to enterprises because of lack of visibility into what devices are on enterprise networks and inadequate use of monitoring tools to watch for malicious behaviors.

iot internet of things chains security by mf3d getty

Portnox adds IoT fingerprinting to network access control service

The IoT fingerprinting feature will allow companies to fully identify IoT devices that don't have the storage or processing capabilities to communicate complete identifying information such as model number, or even device type.

Load More