New & Notable
Network security News
July 12, 2022
A Florida man has been charged with running a counterfeit operation that duped hospitals, schools, government agencies and the military.
June 20, 2022
IT professionals were excited to see cloud-based Meraki management for Catalyst switches but were less enthusiastic over the new Cisco Security Cloud.
April 08, 2022
Fortinet updated FortiOS with an inline sandbox and a cloud access security broker. Cato has added new network access controls to its SASE service.
March 18, 2022
Israeli startup OneLayer has launched from stealth with $8.2 million in seed funding and a software-based platform to secure IoT devices on private LTE and 5G networks.
Network security Get Started
Bring yourself up to speed with our introductory content
The Secure Shell protocol, SSH, was redesigned and released as SSH2 in 2006. While SSH1 lingers for legacy uses, find out how the protocols differ and why it's important. Continue Reading
User behavior analytics (UBA) is the tracking, collecting and assessing of user data and activities using monitoring systems. Continue Reading
The Secure Shell protocol authenticates and encrypts network connections. Find out how it's used to build tunnels while crossing private networks and even firewalls. Continue Reading
Evaluate Network security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Security and IT teams face challenges in managing and securing a growing number of endpoints, which is driving organizations to look for converged capabilities, according to ESG. Continue Reading
VMware SASE Platform provides many strong networking and security capabilities, but it comes in an offering that feels like many individual products packaged together. Continue Reading
As organizations become more cloud-centric and adapt to remote work, a new technique known as security service edge is gaining traction. Continue Reading
Manage Network security
Learn to apply best practices and optimize your operations.
SSH connects key systems and the people and processes necessary to keep them functioning. Learn how to use SSH key management best practices to protect your systems and network. Continue Reading
When it comes to data breach prevention, the stakes are high. While it's impossible to eliminate the risk, organizations can minimize it by following these best practices. Continue Reading
Security information management (SIM) is the practice of collecting, monitoring and analyzing security-related data from computer logs and various other data sources. Continue Reading
Problem Solve Network security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Patching is like flossing -- everyone knows they should do it, yet too few do it often and well. Explore why unpatched software is still ubiquitous, despite the risks. Continue Reading
Risk management programs yield massive data on network security vulnerabilities. Infosec pros must rank risks to prioritize remediation efforts. Continue Reading
Despite five major gaps that hamper SASE implementation, Gartner recommended enterprises should plan their migration timeline and aim to consolidate to a single vendor. Continue Reading