Network Security News
February 03, 2016
Faced with little time and strict security needs, U.S. Army network engineers came up with an inventive way to use a network tunnel to improve communications amid the Ebola crisis.
January 14, 2016
This week, a patch becomes available for Juniper firewalls, analysts parse IT employment statistics for 2015 and Aruba deploys 802.11ac for the U.S. Army.
December 21, 2015
Illumio wins SearchNetworking's Network Innovation Award for its Adaptive Security Platform.
November 12, 2015
In this week's blogs, analysts explore cloud security and privacy, service desk improvements and machine learning for anomaly detection.
Network Security Get Started
Bring yourself up to speed with our introductory content
With a constant drumbeat of security and data breaches in 2015, it's no wonder networking pros have questions and concerns about network security topics. These five stats can get you started. Continue Reading
Air gapping is a security measure that involves removing a computer or network from any externally connected network physically and also ensuring there is also no wireless connection. The NSA TEMPEST project provides recommendations for air-gapping... Continue Reading
While network reconnaissance is a critical step in identifying potential vulnerabilities, performing an IPv6 network audit without the right tools can be a challenge. Learn about the tools available and how to properly use them. Continue Reading
Evaluate Network Security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The next-generation firewall has become the focal point of an enterprise security strategy that integrates with cloud-based threat analysis and endpoint management. Continue Reading
Tempered Networks wins this month's Network Innovation Award for its HIPswitch IoT management and security platform, which its director of product management discusses in this Q&A. Continue Reading
Which network monitoring system features should you look for before buying an availability monitoring system? Continue Reading
Manage Network Security
Learn to apply best practices and optimize your operations.
Almost anyone who has installed a network knows that much of it cannot be done from the relative comfort of an office chair. Whether you have to mount wireless access points on ceilings or pull Ethernet cables behind the walls, challenging ... Continue Reading
SD-WANs can create new risks and challenges, but they also offer new rewards if users follow good networking principles. Continue Reading
Thirty years after creating the Internet's domain name system, co-creator Paul Mockapetris talks about addressing Internet challenges with a more secure DNS. Continue Reading
Problem Solve Network Security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The threat of an evil twin attack has plagued enterprises for years, and it's still not leaving. Expert Nick Lewis explains how to defend against evil twins. Continue Reading
In this Q&A, one network engineer describes how he's adapting his wireless network design to overcome challenges from the old world as well as the digital age. Continue Reading
In this Q&A, a network engineer at the Rochester Institute of Technology explains his favorite weapons against network threats: user education and vulnerability scanning. Continue Reading