NETWORK SECURITY

The network ties modern enterprises together and makes far-flung collaboration possible – which is why it's also an organization's biggest security nightmare. Our network security coverage keeps you up to date on the latest methods and technologies for keeping your network safe from hackers and other attacks.

LATEST NETWORK SECURITY ARTICLES

Palo Alto Networks Growing Revenue from Both New and Updated Services

|

Network security vendor announced its first quarter fiscal 2018 financial results, reporting revenue of $505.5 million.

READ MORE

Ten Top Next-Generation Firewall (NGFW) Vendors

|

Next-generation firewalls are essential to IT security. We review ten of the best.

READ MORE

25 Percent of IT Pros Say Their Leaders Are Digitally Illiterate

|

Another 22 percent are unsure.

READ MORE

Uplevel Systems Launches Secure SMB Suite

|

Aimed at small businesses and the MSPs that serve them, the bundle includes a firewall, IPS, secure DNS, VPN and other protections.

READ MORE

Barracuda Floats Cloud Generation Firewalls

|

The company's updated NextGen Firewall and Web Application Firewall offerings are now ready to tackle cloud application security challenges.

READ MORE

TOP NETWORK SECURITY RESOURCES

IOT SECURITY

Learn what smart enterprises can do to secure their IoT deployments.

READ MORE

PATCH MANAGEMENT

Find out everything you need to know to implement an effective patch management software system.

READ MORE

RISK MANAGEMENT

Cybersecurity risk management can help you identify your biggest security vulnerabilities and apply the solutions that will keep you protected.

READ MORE

INCIDENT RESPONSE

Prepare for attacks and breaches by putting together an incident response plan and incident response team.

READ MORE

SECURITY INCIDENT AND EVENT MANAGEMENT (SIEM)

SIEM products are no longer just for large enterprises. We'll help determine if SIEM is for you.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Be Afraid of Your Shadow: What Is Shadow IT and How to Reduce It

Are you confident that employees are only using IT-sanctioned methods of transferring data? If the answer is "no", then your IT infrastructure and sensitive data are far more vulnerable to being breached by hackers and cybercriminals. Many IT teams may not even realize that "shadow IT" …

The Definitive Guide to Secure File Sharing

In the interest of faster workflows and better collaboration, employees are now sharing files containing sensitive or proprietary data more than ever before, both internally and externally. When these files move beyond the enterprise's security perimeter, they become vulnerable to a range …
 
SEE ALL WHITEPAPERS
 
How to Achieve an Optimal Security Posture

How to Achieve an Optimal Security Posture

|

Complete and total security is out of the question, so which IT security technologies will get you to your ideal security posture? We outline your options.

READ MORE
45 Percent of IT Pros Expect a Major, Disruptive Cyber Attack Within the Next Year

45 Percent of IT Pros Expect a Major, Disruptive Cyber Attack Within the Next Year

|

Still, 89 percent say they're confident in their organization's cyber security stance.

READ MORE
How the Government  of Canada Plans To Set CyberSecurity Policy

How the Government of Canada Plans To Set CyberSecurity Policy

|

At SecTor security conference, the Director General for National Cyber Security in the Government of Canada details her government's policies for keeping Canadians safe online.

READ MORE
NeuVector Courts Large-Scale Enterprise Container Deployments

NeuVector Courts Large-Scale Enterprise Container Deployments

|

Version 1.3 of the application container security solution marks the arrival of a new Enterprise edition.

READ MORE