New & Notable
Network Security News
April 08, 2022
Fortinet updated FortiOS with an inline sandbox and a cloud access security broker. Cato has added new network access controls to its SASE service.
March 18, 2022
Israeli startup OneLayer has launched from stealth with $8.2 million in seed funding and a software-based platform to secure IoT devices on private LTE and 5G networks.
February 25, 2022
Arista Networks will embed network detection and response software in campus switches to provide AI-driven threat detection across the network.
February 09, 2022
Palo Alto's updated PAN-OS software uses machine learning to analyze network traffic in real time, and two firewall appliances provide the processing power to support it.
Network Security Get Started
Bring yourself up to speed with our introductory content
The top 10 spyware list describes the 10 common spyware threats behind famous spyware attacks and is frequently identified by Webroot's Spy Audit, a free spyware scanner tool. Continue Reading
Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's authorization. Continue Reading
A SYN flood attack is a type of denial-of-service (DoS) attack on a computer server. Continue Reading
Evaluate Network Security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Administrators are assessing microsegmentation to beef up access control and security. But deploying microsegmentation can be complex. Continue Reading
Network segmentation and microsegmentation both control access but vary in how they do it, as well as how granular their approach is. Learn the differences here. Continue Reading
Zero-trust security models, wireless WAN evolution and the emergence of pop-up businesses are all helping to fuel innovation in IoT networking capabilities. Continue Reading
Manage Network Security
Learn to apply best practices and optimize your operations.
Security information management (SIM) is the practice of collecting, monitoring and analyzing security-related data from computer logs and various other data sources. Continue Reading
As more NetOps teams implement Agile methods, network and security testing must be part of a holistic approach that involves developers, networking and security teams working together. Continue Reading
Securing APIs properly requires testing throughout their design lifecycle. Explore the leading tools that enable automated, continuous API security testing. Continue Reading
Problem Solve Network Security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Patching is like flossing -- everyone knows they should do it, yet too few do it often and well. Explore why unpatched software is still ubiquitous, despite the risks. Continue Reading
Risk management programs yield massive data on network security vulnerabilities. Infosec pros must rank risks to prioritize remediation efforts. Continue Reading
Despite five major gaps that hamper SASE implementation, Gartner recommended enterprises should plan their migration timeline and aim to consolidate to a single vendor. Continue Reading