Security

Security | News, how-tos, features, reviews, and videos

Cloud security threats  >  theft / breach / fraud / phishing
Digital fingerprints are virtually connected. [tracking / identity / genetics / data privacy]

hottest and coldest outsourcing trends city globe

Pros and cons of managed SASE

Managed SASE can be appealing for enterprises that want a single provider for deployment and management of WAN and security infrastructure, but there can be tradeoffs depending on provider flexibility, platform interoperability, and...

teams / teamwork / collaboration / discussion / planning / meeting / communication

Survey: NetOps is essential but undervalued in making multi-cloud decisions

For multi-cloud networking to succeed, NetOps must have a seat at the table, but IT leaders need to buy into it.

Quantum computing / security

QuSecure launches quantum-computing based security for endpoints

Quantum-based security with what’s advertised as “frictionless” deployment is now available from QuSecure.

Data center / enterprise networking

Remote.it takes steps toward zero trust with 'single line of code' provisioning

New integration with Okta, containerization support and a tagging system are all present in the latest version of Remote.it’s network management platform.

Computerworld Tech Forecast 2017 - Hottest Tech Skills for 2017

What to expect from SASE certifications

SASE certification options are expanding, with Palo Alto joining Cato Networks, Netskope and Versa Networks. Are they worth the effort?

it as a product box package hand with product technology nodes primary

8 hot networking technologies for 2023

Innovative technologies designed to make networks faster, smarter and more secure

170227 mwc 02756

Intel boosts VM security, guards against stack attacks in new Xeon release

Intel’s TDX framework gains a new capability, and a “shadow stack” in Xeon’s fourth generation aims to knock out a dangerous cyberattack method.

screen shot remote worker

Work from home is here to stay, so how should IT adjust?

WFH strategy should cover the basics of performance and security, but also extend to ergonomics, online meeting etiquette and data retention

binary code flows around a corporate structure / cybersecurity / technology companies

Former VMware exec Gillis resurfaces to run Cisco security business (again)

Tom Gillis, who left VMware in December, is expected to drive growth in Cisco's cloud, AI and end-to-end security initiatives.

businessman looking through binoculars future vision prediction

Looking ahead to the network technologies of 2023

Virtual networking will drive NaaS evolution, and cloud-hosted security options will explode.

2022 robot future shutterstock 2084251795

The top 12 tech stories of 2022

The year highlighted how vulnerable the technology sector is to the vagaries of geopolitics and the macroeconomy, as IT giants laid off workers, regulators cracked down on tech rule-breakers, nations negotiated data security...

zero trust security model secured network picture id1313494602

What is Zero Trust Network Architecture (ZTNA)?

Zero Trust is a security strategy (not a product) based on the idea that devices and users are considered untrusted until they can be authenticated

data center female it specialist using laptop server farm cloud and picture id1336250828

Data center networking trends to watch for 2023

Hybrid and multicloud initiatives are driving changes in data center networks, including new security rollouts, greater automation, and evolving netops strategies.

cloud security shield with checkmark / cloud / digital connections / cloud security expert / CASB

F5 expands security portfolio with App Infrastructure Protection

AIP goes one step further than API security and provides telemetry collection and intrusion detection for cloud-native workloads.

Ransomware  >  A coin-operated lock ransoming an encrypted system.

Ransomware: It’s coming for your backup servers

Compromised backup servers can thwart efforts to restore damage done by ransomware and give attackers the chance to extort payments in exchange for keeping sensitive stolen data secret.

istock 1153428651

Top 10 Best Residential Proxy Service Providers

Several residential proxy providers claim to provide the ultimate security for your web activities and enable you to browse anonymously. Get the best value for money with our list of the top ten best residential proxy service...

keeping the cloud secure cloud security lock padlock private cloud

What is SASE? A cloud service that marries SD-WAN with security

Secure access service edge is a Gartner model for streamlining network access, improving security, boosting network performance and reducing the number of vendors and devices IT pros have to deal with.

Data center / enterprise networking

Ransomware attack knocks Rackspace’s Exchange servers offline

Rackspace’s hosting for Exchange servers remained offline Tuesday after an outage Friday that the company now ascribes to a ransomware attack.

Load More