Security

Security | News, how-tos, features, reviews, and videos

Upwardly pointing arrows overlay the face of Benjamin Franklin on the U.S. one hundred dollar bill.
networking background

08 how deloitte is embedding security

Gartner: 8 security trends facing the enterprise

As organizations become less centralized they face new security challenges that require new ways of addressing threats that will change the basic fabric of network security, according to Gartner analysts. A persistent challenge...

digital screen with encryption data background big data with binary picture id1332211233

Gartner: Top strategic technology trends for 2022

Digital investments, be they in AI, cloud, security or engineering, will be among the top technology drivers for 2022, according to Gartner’s annual forecast of what it expects will be the top strategic IT trends for the coming year.

spot edgecomputing nww by andre popov shutterstock 2400x1600 primary 6

Edge computing: 5 potential pitfalls

Edge computing has many upsides including better near-real-time response and analytics for IoT, but it’s far from plug and play.

A man looks displeased/stressed/frustrated and pinches his brow while using a computer at work.

4 questions that get the answers you need from IT vendors

It’s hard to set priorities for buying IT technology when vendors poorly explain what they do, how they do it, and what the concrete benefits are. Asking them these four questions can break the information logjam.

digital network security concept picture id1192070289

VMworld 2021: VMware to pack more security into NSX

An upcoming release of VMware's core NSX networking software will add anomaly detection, analytics, and data-gathering software sensors.

network security lock padlock breach

For networking pros, every month is Cybersecurity Awareness Month

Network security shouldn't be just a set of routine tactical chores to maintain safeguards already in place, but a constant strategizing to anticipate the next threat.

interconnecting gears / process / automation / machinery / mechanism / efficiency

How and why automation can improve network-device security

Automation can help boost enterprise security by making sure devices are properly configured to enforce security policies.

security 2168234 1920

Cisco patches three critical holes in IOS XE software

Cisco has patched three critical security holes in its IOS XE software, which is used across a variety of its core routers and switches.

hybrid cloud

Nutanix offers virtual private cloud HCI, multicloud workload management

Nutanix’s AOS 6 enables enterprises to build virtual private clouds, while Era update eases data-management software for hybrid and multicloud environments.

tape drive rack

Tape backup as a defense vs. ransomware

Tape isn’t close to being the perfect backup, but it is pretty impervious to ransomware.

sd-wan options

Palo Alto shapes SASE package for hybrid enterprises

Palo Alto’s Prisma SASE brings together the company’s its core Prisma Access package with the company’s Prisma SD-WAN technology

Computerworld Tech Forecast 2017 - Hottest Tech Skills for 2017

What to expect from SASE certifications

Free and fee-based SASE certifications are cropping up from vendors including Cato Networks, Netskope and Versa Networks. Are they worth the effort?

certification education knowledge learning silhouette with graduation cap with abstract technology

Gartner: IT skills shortage hobbles cloud, edge, automation growth

IT executives have plans to invest in emerging technologies despite the challenge of finding IT pros with the right training.

work from home

Palo Alto launches an enterprise-grade security pack for remote workers

Palo Alto’s Okyo Garde package includes a WiFi-6-based hardware device and mobile application software to deliver malware, ransomware and phishing protection.

Conceptual image of a network labeled 'Zero Trust.'

5 steps for modernizing enterprise networks

Software-defined networking, artificial intelligence, cloud, new Wi-Fi and 5G options, and network security can combine to improve performance of traditional networks.

cloud security lock

Juniper software triggers network response to threats

Juniper Cloud Workload Protection controls application execution, monitors for signs of attacks, and takes steps to block them.

telecommuting corona virus surgical mask remote worker 5g wi fi by mediaphotos getty images and wyn

Cisco preps now for the hybrid workforce

Cisco says its employees will work from home part of the time and be supported with its networking gear.

ipsecurity protocols network security vpn3

Feds' demand for software standards could boost enterprise security

An executive order issued in May by the Biden Administration has elevated the status of the software bill of materials, by mandating their use in federal government contracting.

Load More