networking model
network / data center

Tech Spotlight   >   Cybersecurity [CSO]   >   Hands gesture in conversation

8 questions to ask vendors about Zero Trust Network Access (ZTNA)

Most companies understand they need to transition from perimeter-based security to a Zero Trust model. And they understand that they can’t purchase Zero Trust as an off-the-shelf product. Here are eight questions to ask prospective...

database data center network security

6 top network security threats and how to beat them

Here's a list of the most insidious external security threats and internal vulnerabilities, and how to successfully protect the network against both

nvidia hopper gpu

The three-way race for GPU dominance in the data center

Nvidia, AMD, and Intel are about to slug it out for a share of the growing graphics-processing-unit market that’s being fueled by the needs of artificial intelligence and machine learning.

wireless network - internet of things edge [IoT] - edge computing - digital transformation

Private 5G: Its use in enterprises faces challenges

The availability of services from AWS, Cisco and HPE is propelling private 5G forward, but enterprises still have to contend with the technology's costs, device limitations, and competition from established alternatives such as Wi-Fi...

wifi nww badge

10 most powerful Wi-Fi vendors

Cisco, HPE-Aruba, Ubiquiti, CommScope are driving the transition from Wi-Fi 5 to Wi-Fi 6 and beyond with automation, AI and machine learning

artificial intelligence brain machine learning digital transformation world networking

How SASE uses AI

SASE vendors are applying AI and machine learning to the network- and security-related data they collect to sharpen analytics, tighten security and boost performance.

ethernet cable declantm flickr

What is Ethernet?

Ethernet protocol connects LANs, WANs, Internet, IoT devices, cloud, Wi-Fi systems into one seamless global communications network

bike accident / failure / disaster recovery

What is DRaaS and how it can save your business from disaster

Disaster Recovery as a Service (DRaaS) enables enterprises of all sizes to safely backup their data in the cloud and quickly recover from a natural disaster, cyberattack or unplanned outage

edge computing iot edge by mf3d getty

Edge computing moves toward full autonomy

With edge computing already transforming the way data is being handled, processed, and delivered, edge site operations are becoming as hands-off as possible

A developer / engineer / technician works with servers, wires, and cables in a data center.

9 hot jobs in the evolving data center

Data-center pros looking to ride technology waves toward more secure careers need both technical and people skills.

network security primary2

10 essential Linux tools for network and security pros

These open source security frameworks help enterprises stay one step ahead of attackers by facilitating penetration testing and vulnerability assessments on wired and wireless enterprise networks.

hot new it jobs guy running with laptop

7 emerging network jobs that could boost your career

Hot trends such as cloud, edge and remote work, plus new approaches including SASE, SD-WAN and ZTNA, are reshaping network job titles and skills requirements

data center female it specialist using laptop server farm cloud and picture id1336250828

What is a network operations center (NOC)?

A NOC is a centralized location where IT professionals can troubleshoot, monitor and optimize enterprise networks

network security digital internet firewall binary code

Troubleshooting puzzle: What caused the streaming to degrade?

Performance of streaming applications worked for years then suddenly dropped, apparently for no reason. Was it the firewalls?

colorful neon networking background

What is the Spanning Tree Protocol?

Spanning Tree optimizes Ethernet LAN traffic by eliminating loops and re-routing around disabled nodes

cyber technology security protection monitoring concept advanced picture id1276687348

What is NAC and why is it important for network security?

NAC plays a key role in Zero Trust network access (ZTNA), and is a powerful tool for securing IoT devices and protecting mobile and remote workers

bandages on computer processor chip and circuits

10 ways IT can navigate the chip shortage

Buying used gear, extending the life of existing IT equipment, and considering cloud alternatives are among the tactics industry watchers recommend for dealing with the ongoing semiconductor shortage.

supply chain / virtual network of connections

NaaS adoption will thrive despite migration challenges

Enterprises are embracing network-as-a-service (NaaS) offerings as they work through vendor hype, budget obstacles, and the challenges of legacy systems.

Load More