Network security
With the growth of malware and data breaches, enterprises must ensure their networks -- and the applications and traffic on those networks -- are secure. Learn about important network security strategies and technologies, such as VPNs, Secure Access Service Edge (SASE), zero trust and software-defined perimeter (SDP).
New & Notable
Network security News
-
July 12, 2022
12
Jul'22
Counterfeit scheme trafficked in $1 billion in Cisco gear
A Florida man has been charged with running a counterfeit operation that duped hospitals, schools, government agencies and the military.
-
June 20, 2022
20
Jun'22
Cisco customers eager for Meraki's Catalyst management
IT professionals were excited to see cloud-based Meraki management for Catalyst switches but were less enthusiastic over the new Cisco Security Cloud.
-
April 08, 2022
08
Apr'22
Fortinet, Cato Networks add security for distributed SD-WANs
Fortinet updated FortiOS with an inline sandbox and a cloud access security broker. Cato has added new network access controls to its SASE service.
-
March 18, 2022
18
Mar'22
Startup OneLayer offers IoT security on cellular networks
Israeli startup OneLayer has launched from stealth with $8.2 million in seed funding and a software-based platform to secure IoT devices on private LTE and 5G networks.
Network security Get Started
Bring yourself up to speed with our introductory content
-
tailgating (piggybacking)
Tailgating, sometimes referred to as piggybacking, is a type of physical security breach in which an unauthorized person follows an authorized individual to enter secured premises. Continue Reading
-
segregation of duties (SoD)
Segregation of duties (SoD) is an internal control designed to prevent error and fraud by ensuring that at least two individuals are responsible for the separate parts of any task. Continue Reading
-
SSH2 vs. SSH1 and why SSH versions still matter
The Secure Shell protocol, SSH, was redesigned and released as SSH2 in 2006. While SSH1 lingers for legacy uses, find out how the protocols differ and why it's important. Continue Reading
Evaluate Network security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
7 guidelines to secure network storage
These practices, including firmware and VPN guidance, protect NAS devices. Use these steps as standalone procedures or incorporate them into your overall security process. Continue Reading
-
What's driving converged endpoint management and security?
Security and IT teams face challenges in managing and securing a growing number of endpoints, which is driving organizations to look for converged capabilities, according to ESG. Continue Reading
-
Review the components of VMware SASE Platform
VMware SASE Platform provides many strong networking and security capabilities, but it comes in an offering that feels like many individual products packaged together. Continue Reading
Manage Network security
Learn to apply best practices and optimize your operations.
-
How does proper SSH key management protect your network?
SSH connects key systems and the people and processes necessary to keep them functioning. Learn how to use SSH key management best practices to protect your systems and network. Continue Reading
-
How to prevent a data breach: 10 best practices and tactics
When it comes to data breach prevention, the stakes are high. While it's impossible to eliminate the risk, organizations can minimize it by following these best practices. Continue Reading
-
security information management (SIM)
Security information management (SIM) is the practice of collecting, monitoring and analyzing security-related data from computer logs and various other data sources. Continue Reading
Problem Solve Network security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
6 reasons unpatched software persists in the enterprise
Patching is like flossing -- everyone knows they should do it, yet too few do it often and well. Explore why unpatched software is still ubiquitous, despite the risks. Continue Reading
-
How to rank enterprise network security vulnerabilities
Risk management programs yield massive data on network security vulnerabilities. Infosec pros must rank risks to prioritize remediation efforts. Continue Reading
-
How enterprises can close 5 major SASE gaps
Despite five major gaps that hamper SASE implementation, Gartner recommended enterprises should plan their migration timeline and aim to consolidate to a single vendor. Continue Reading