Network Security Best Practices and Products
- January 24, 2014
Based on the SRX security gateway series, Juniper Firefly Perimeter is a software-based security gateway for multi-tenant environments.
- January 23, 2014
Cisco's revision of the CCNP Security certification curriculum will teach engineers how to do their jobs rather than master devices.
- January 22, 2014
Cisco report finds a deficit of pros in IT security careers, and further expertise is needed to arm networks against sophisticated cyberattacks.
- January 22, 2014
Networking blogs: Analysts question traditional antivirus security measures and hypothesize on the structure of Cisco's new ACI.
- January 20, 2014
Analysts discuss data center, cloud encryption and Wi-Fi trends that can be expected in 2014.
- January 17, 2014
Network security expert Michele Chubirka discusses why objective and curated threat intelligence is so difficult to obtain.
- January 16, 2014
Networking blogs: In this week's round-up, analysts discuss big data best practices, network topology and New Year's resolutions.
- January 15, 2014
ADC vendor A10 Networks announces the Thunder TPS, an anti-DDoS appliance for enterprises and service providers.
- January 10, 2014
This week's networking blogs examine the impact of FireEye's stealth acquisition of Mandiant and how the NSA gets its info.
- January 09, 2014
McAfee analysts said ransomware and social attacks are network security threats that will demand attention in 2014.
- January 08, 2014
Citing that sandboxing can't catch every advanced persistent threat, Palo Alto Networks acquires stealth startup Morta Security.
- January 06, 2014
German magazine Der Spiegel has reported routers and firewalls from top vendors have NSA backdoor hacks. Network engineers must take action.
- January 02, 2014
In the New Year, enterprises will want to encrypt all the data they send to the cloud and across the WAN, and network virtualization will be a focus.
- December 20, 2013
It's all about the good, the bad and the ugly, says security consultant Michele Chubirka, when it comes to enterprise security in 2013.
- December 12, 2013
In this week's blogs, analysts point out weaknesses in enterprise security systems and offer insight into Microsoft's increased global presence.