NETWORK SECURITY

The network ties modern enterprises together and makes far-flung collaboration possible – which is why it's also an organization's biggest security nightmare. Our network security coverage keeps you up to date on the latest methods and technologies for keeping your network safe from hackers and other attacks.

LATEST NETWORK SECURITY ARTICLES

Bitdefender Hypervisor Introspection Protects Citrix XenServer Environments

|

The new hypervisor-enforced security offering sniffs out threats that agent-based software in a virtual machine may miss.

READ MORE

SiteLock Takes Aim at Defending Sites from Attacks

|

VIDEO: SiteLock President Neill Feather explains how his firm is helping SMBs defend their websites against increasingly sophisticated cyber risks.

READ MORE

Over 90 Percent of Organizations See Challenges in Complying with EU GDPR

|

55 percent anticipate challenges with Article 17, the 'right to be forgotten.'

READ MORE

Average DDoS Attack Size Surged in Q1 2017

|

The average attack size increased by 26 percent over the previous quarter, according to a recent report.

READ MORE

Cisco Debuts IoT Threat Defense Platform

|

The company collects its network security technologies into an integrated IoT security platform for enterprises.

READ MORE

TOP NETWORK SECURITY RESOURCES

IOT SECURITY

Learn what smart enterprises can do to secure their IoT deployments.

READ MORE

PATCH MANAGEMENT

Find out everything you need to know to implement an effective patch management software system.

READ MORE

RISK MANAGEMENT

Cybersecurity risk management can help you identify your biggest security vulnerabilities and apply the solutions that will keep you protected.

READ MORE

INCIDENT RESPONSE

Prepare for attacks and breaches by putting together an incident response plan and incident response team.

READ MORE

THREAT INTELLIGENCE AND ANALYTICS

We offer a thorough overview of cyber threat intelligence and how to implement it in your business.

READ MORE

SECURITY INCIDENT AND EVENT MANAGEMENT (SIEM)

SIEM products are no longer just for large enterprises. We'll help determine if SIEM is for you.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Hybrid WAN Services Emerging as a Viable Network Option

Business customers have relied on MPLS–based VPN service as their primary connectivity for their private networking needs for many years now. Ovum now sees an emerging trend of alternatives that can complement or replace MPLS–based VPN services. The growing use of Ethernet, …

Be Afraid of Your Shadow: What Is Shadow IT and How to Reduce It

Are you confident that employees are only using IT-sanctioned methods of transferring data? If the answer is "no", then your IT infrastructure and sensitive data are far more vulnerable to being breached by hackers and cybercriminals. Many IT teams may not even realize that "shadow IT" …

Whodunit: The Mystery of the APT

Cybercriminals can be certain about a few things. Most companies store their important data on their networks. Patents, innovative designs, customer information, and confidential data — it's all there. Intellectual property is highly valuable, making it the number one thing …

Success Story: The Masiello Group Is Propelling Growth & Connectivity with UCaaS

The Masiello Group, a large regional provider of real estate and home ownership services, turned to Windstream for a flexible, scalable solution to connect their business with multiple offices across four states. In this case study video, hear how Windstream leveraged Ethernet, Data Center …
 
SEE ALL WHITEPAPERS
 
Executives Are Most at Risk of Being Hacked Outside the Office

Executives Are Most at Risk of Being Hacked Outside the Office

|

And 93 percent of organizations are concerned about the security challenges presented by a growing mobile workforce, a recent survey found.

READ MORE
Three Quarters of CEOs Are Putting Corporate Data at Risk

Three Quarters of CEOs Are Putting Corporate Data at Risk

|

Still, 63 percent say losing corporate data would destroy their business, a recent survey found.

READ MORE
Why Akamai Supports Let's Encrypt

Why Akamai Supports Let's Encrypt

|

VIDEO: Andy Ellis Chief Security Officer at Akamai explains why the free Let's Encrypt SSL/TLS certificate initiative is important.

READ MORE
Data Breach at Restaurant Search Service Exposes 17 Million User Accounts

Data Breach at Restaurant Search Service Exposes 17 Million User Accounts

|

User IDs, names, user names, email addresses and hashed passwords were stolen.

READ MORE