Network security
With the growth of malware and data breaches, enterprises must ensure their networks -- and the applications and traffic on those networks -- are secure. Learn about important network security strategies and technologies, such as VPNs, Secure Access Service Edge (SASE), zero trust and software-defined perimeter (SDP).
Top Stories
-
Tutorial
05 Sep 2023
Use Angry IP Scanner to audit the network
Angry IP Scanner provides a network scanner alternative to Nmap that is simple, user-friendly and versatile across OSes. Scan types include ping scans, UDP scans and TCP scans. Continue Reading
-
Feature
22 Aug 2023
Top 13 ransomware targets in 2023 and beyond
Two in three organizations suffered ransomware attacks in a single year, according to recent research. And, while some sectors bear the brunt, no one is safe. Continue Reading
-
Feature
24 Nov 2021
Ultimate guide to secure remote access
This comprehensive secure remote access guide outlines the strategies, tools and best practices to provide anywhere access while protecting data, systems and users. Continue Reading
-
Feature
23 Nov 2021
SecOps' need for traffic data drives NetSecOps collaboration
Security teams want to analyze network traffic data to identify anomalies and threats. As a result, network and security teams need to find ways to work together. Continue Reading
-
Tip
15 Nov 2021
How zero-trust SDP can work with a VPN for remote work
Implementing software-defined perimeter and zero-trust security models with a corporate VPN adds significant layers of user and device verification and authentication. Continue Reading
-
News
11 Nov 2021
AT&T launches a managed SASE offering with Cisco
AT&T aims its latest managed SASE service at enterprises using Cisco hardware. The offering's features range from firewall and secure web gateway functionality to DNS layer security. Continue Reading
-
Tip
04 Nov 2021
Evaluate the components of Cisco SASE
Cisco's SASE platform, Umbrella, has all the components of a SASE architecture, but it has a lot of integration complexity and a reliance on appliances. Continue Reading
-
Tip
01 Nov 2021
Adopt 5 best practices for hybrid workplace model security
As hybrid workforce models become the norm due to the pandemic, enterprises should look to best practices to ensure secure unified access for on-premises and WFH employees. Continue Reading
-
Tip
29 Oct 2021
Use network standardization to facilitate automation
Network teams can automate and standardize network designs to improve configurations, simplify operations and more easily implement changes within their networks. Continue Reading
-
Answer
04 Oct 2021
Remote access vs. site-to-site VPN: What's the difference?
A remote access VPN connects remote users from any location to a corporate network. A site-to-site VPN, meanwhile, connects individual networks to each other. Continue Reading
-
Feature
30 Sep 2021
6 reasons unpatched software persists in the enterprise
Patching is like flossing -- everyone knows they should do it, yet too few do it often and well. Explore why unpatched software is still ubiquitous, despite the risks. Continue Reading
-
Feature
23 Sep 2021
Experts debate XDR market maturity and outlook
Is extended detection response still all buzz and no bite? Experts disagree on whether XDR qualifies as a legitimate market yet or still has a ways to go. Continue Reading
-
Tip
21 Sep 2021
A review of Cato Networks' SASE Cloud platform
Cato's SASE Cloud lacks some features and may require customers to replace point products to fully benefit from the platform. But Cato aligns with SASE’s cloud-native vision and is a strong contender in the market. Continue Reading
-
Tip
11 Aug 2021
A deep dive into Fortinet's SASE platform
Despite its strong security foundation, Fortinet's SASE platform lacks a cloud-native strategy and requires teams to stitch the architecture together. Continue Reading
-
Answer
13 Jul 2021
The differences between PAP and CHAP
PAP uses a two-way handshake to authenticate client sessions, while CHAP uses a three-way handshake. Both authentication processes are common, but one is more secure. Continue Reading
-
Answer
07 Jul 2021
What are port scan attacks and how can they be prevented?
Port scans provide data on how networks operate. In the wrong hands, this info could be part of a larger malicious scheme. Learn how to detect and defend against port scan attacks. Continue Reading
-
Tip
30 Jun 2021
How to rank enterprise network security vulnerabilities
Risk management programs yield massive data on network security vulnerabilities. Infosec pros must rank risks to prioritize remediation efforts. Continue Reading
-
Quiz
30 Jun 2021
12 official practice questions for the CCNA 200-301 exam
These practice questions for CCNA 200-301 lay out what readers need to know about network security and IP routing in the LAN, from 'CCNA 200-301 Official Cert Guide, Volumes 1 and 2.' Continue Reading
-
Feature
25 Jun 2021
How enterprises can close 5 major SASE gaps
Despite five major gaps that hamper SASE implementation, Gartner recommended enterprises should plan their migration timeline and aim to consolidate to a single vendor. Continue Reading
-
Opinion
25 Jun 2021
Hybrid workforce model needs long-term security roadmap
From SASE to ZTNA to EDR to VPNs, enterprises need to deploy the technologies to develop a secure hybrid workforce model now that can work into the future. Continue Reading
-
Answer
22 Jun 2021
How to use two VPN connections at the same time
Network managers and users might opt to set up two VPN connections at the same time, from the same remote device. But that might not be possible -- or safe. Continue Reading
-
Report
15 Jun 2021
Guide to business continuity and pandemic planning
This guide explains the enterprise impact of the COVID-19 pandemic and how business continuity planning keeps organizations safe and in operation. Continue Reading
-
Tip
11 Jun 2021
The pros and cons of Palo Alto Networks' SASE platform
Palo Alto Networks is commonly mentioned in SASE discussions. While the vendor has strong security capabilities, it also brings integration complexities and PoP limitations. Continue Reading
-
Tip
07 Jun 2021
How to pick the best network security service provider
Managed security service providers have different levels of expertise. Be sure to match your organization's security needs with the right network security provider. Continue Reading
-
Tip
04 Jun 2021
5 steps to secure the hybrid workforce as offices reopen
Companies must now face the security challenges of overseeing a hybrid workforce as employees return to the office. Continue Reading
-
News
02 Jun 2021
Microsoft buys ReFirm Labs to bolster IoT firmware security
Microsoft has bought ReFirm Labs in an IoT security play. The company said Refirm's open source-based products would help it address firmware vulnerabilities in IoT devices. Continue Reading
-
Feature
02 Jun 2021
What is secure remote access in today's enterprise?
Out with the old, in with the new. The meaning of secure remote access, and how organizations achieve it, is changing. Here's what you need to know. Continue Reading
-
Tip
01 Jun 2021
Who is responsible for secure remote access management?
The pandemic exposed the need for a strong secure remote access strategy. Now, organizations need to figure out which team must make it happen. Continue Reading
-
Feature
28 May 2021
Network reconnaissance techniques for beginners
In this excerpt of 'How Cybersecurity Really Works,' author Sam Grubb breaks down common network reconnaissance techniques used by adversaries to attack wired networks. Continue Reading
-
Feature
21 May 2021
RSA Conference 2021: 3 hot cybersecurity trends explained
In a lightning round session at RSA Conference, ESG analysts discussed three of the hottest topics in cybersecurity in 2021: zero trust, XDR and SASE. Continue Reading
-
Feature
20 May 2021
4 ways to handle the cybersecurity skills shortage in 2021
More than half of cybersecurity pros say their organizations could do more to manage negative effects of the skills shortage, such as overwork and burnout. Find out how. Continue Reading
-
Feature
17 May 2021
Cyber Defense Matrix makes sense of chaotic security market
The Cyber Defense Matrix aims to help CISOs make strategic, informed security investments that weigh cyber risk mitigation in the context of business constraints and goals. Continue Reading
-
News
14 May 2021
Cisco's latest acquisition spree nabs three companies
Cisco's acquisitions, announced this week, would improve event hosting in Webex, boost network speeds for 5G, and enhance its security platform. Deal terms were not released. Continue Reading
-
Tip
14 May 2021
Enterprises mull 5G vs. Wi-Fi security with private networks
While Wi-Fi security can be implemented just as securely as 5G, mechanisms built into 5G offer some compelling benefits to enterprises considering private 5G networks. Continue Reading
-
Feature
10 May 2021
From EDR to XDR: Inside extended detection and response
As the definition of endpoints evolves, so too must the technology to protect them. Enter extended detection and response, or XDR -- one of cybersecurity's hottest acronyms. Continue Reading
-
Feature
07 May 2021
Despite confusion, zero-trust journey underway for many
Zero trust is a catchy phrase with seemingly lofty goals. Uncover the reality behind one of infosec's hottest buzzphrases, and learn why it's within reach for many companies today. Continue Reading
-
Feature
05 May 2021
Buyers must navigate cybersecurity market confusion
Customer confusion in the security market stems from the number of new products designed to deal with a growing number of cyberthreats. Experts look at how to navigate it all. Continue Reading
-
Tip
26 Apr 2021
8 remote access security risks and how to prevent them
Enterprises face myriad remote access security concerns, but training and clear communication can help them bolster their security programs for the long term. Continue Reading
-
Tip
23 Apr 2021
4 attributes key to network-as-a-service model
For a network-as-a-service model to work for the enterprise, it needs to offer four key attributes: an application-specific, elastic, secure and personalized VPN. Continue Reading
-
News
16 Apr 2021
Aruba product integrations advance its SASE strategy
Aruba's latest SASE-related integrations involve the Silver Peak-based SD-WAN, Threat Defense and the ClearPass Policy Manager. More product integrations are likely. Continue Reading
-
Tip
16 Apr 2021
6 SSH best practices to protect networks from attacks
SSH is essential, but default installations can be costly. Auditing and key management are among critical SSH best practices to employ at any organization. Continue Reading
-
Tip
12 Apr 2021
Threat intelligence frameworks to bolster security
Organizations have many threat intelligence frameworks to work with, each with its own advantages. From for-profit to nonprofit, here's help to figure out which ones you need. Continue Reading
-
Tip
09 Apr 2021
Common network vulnerabilities and how to prevent them
It's not possible to eliminate all network vulnerabilities, but network teams can implement best practices to limit potential attacks and protect their networks. Continue Reading
-
Tip
08 Apr 2021
SASE options for the branch of one -- work from anywhere
More than ever, enterprises need to support individual employees that make up a branch of one. These setups require reliable connectivity, application performance and security. Continue Reading
-
Tip
02 Apr 2021
Best practices for VPN traffic monitoring
VPNs are still a critical part of many enterprise remote access strategies. Networks teams that monitor VPN traffic should look at factors like application usage and overhead. Continue Reading
-
Tip
01 Apr 2021
5 basic steps for effective cloud network security
In hybrid infrastructures, old network security systems won't work. Enterprises must adopt effective cloud network security strategies to keep their assets safe. Continue Reading
-
Feature
31 Mar 2021
How to build a honeypot to increase network security
Create a honeypot that will trap attackers and monitor their activities to enhance your organization's network security. This step-by-step guide takes you through the process. Continue Reading
-
Guest Post
18 Mar 2021
With 5G, security by design is a must
New tech means new security strategies. Deloitte's Wendy Frank and Shehadi Dayekh explain why this is especially true with 5G. Security by design, they advise, is a critical approach. Continue Reading
-
Answer
18 Mar 2021
Compare Azure Firewall vs. NSGs for network security
Traffic to and from resources needs proper security to protect data, but the wrong tool could leave you vulnerable. Explore these two services to find the right level of protection. Continue Reading
-
Feature
16 Mar 2021
The complete Secure Access Service Edge (SASE) guide
SASE helps organizations manage and secure external traffic. But is it the best choice for your environment? Find out how to buy, deploy and manage SASE in this adoption guide. Continue Reading
-
Tip
15 Mar 2021
Endpoint security vs. network security: Why both matter
As the security perimeter blurs, companies often debate the merits of endpoint security vs. network security. However, it shouldn't be an either-or decision. Continue Reading
-
News
10 Mar 2021
News briefs: Koch Industries picks Alkira, Palo Alto
Koch industries combines Alkira networking and Palo Alto security for remote office connectivity; Cisco promotes three women on International Women's Day; AT&T, Fortinet partner. Continue Reading
-
Guest Post
08 Mar 2021
Enterprise edge is telecom operators' new frontier
Network operators have an opportunity to sell new bundles of dynamic enterprise edge services that include SASE, SD-WAN and virtual security if they size it and price it well. Continue Reading
-
Feature
04 Mar 2021
How to become a threat hunter
Top threat hunters are creative and slightly contrarian, enabling them to think outside the box -- much like the best cybercriminals, according to one expert. Continue Reading
-
Tip
26 Feb 2021
5 steps to conduct network penetration testing
Enterprises that want to ensure competent network security strategies should look at how they can implement penetration testing, considering red teams and physical pen tests. Continue Reading
-
Feature
25 Feb 2021
Get started with network penetration testing for beginners
Authentication, patching and configuration are among the most common vulnerabilities found through network penetration testing. Learn more in this free chapter excerpt. Continue Reading
-
Feature
25 Feb 2021
Advice on how to learn network penetration testing skills
As beginners learn network penetration testing skills, they should remember these expert tips: Pay attention to what the client wants, and stick to offense, not defense. Continue Reading
-
Feature
23 Feb 2021
3 SASE case studies exploring real-world deployments
Three case studies demonstrate how SASE technology helps organizations securely connect geographically distributed workforces. Continue Reading
-
News
17 Feb 2021
Palo Alto to buy Checkov creator, Bridgecrew
Palo Alto said it will acquire Bridgecrew, the developer of the static code analysis tool Checkov. DevOps teams use the open source tool to build cloud applications. Continue Reading
-
Tip
16 Feb 2021
7 steps for a network and IT security foundation
Enterprises should make it a habit to review their IT security systems, following steps that include network segmentation, multifactor authentication and security education. Continue Reading
-
Feature
12 Feb 2021
SASE market emerges and grows as the 'wave of the future'
Secure Access Service Edge is the latest technology to garner industry buzz in networking and security. Although it's still relatively new, the technology is making waves. Continue Reading
-
Feature
08 Feb 2021
5 cybersecurity lessons from the SolarWinds breach
Ransomware attack simulations, accessing enterprise logs and pen testing software code are among the best practices cybersecurity pros suggest following the SolarWinds breach. Continue Reading
-
Tip
08 Feb 2021
How to secure remote access for WFH employees in 4 steps
The global pandemic caused mayhem on network security environments. Enterprises need to bring rigor back to their systems and tighten security for remote workers. Continue Reading
-
News
04 Feb 2021
Arista launches zero-trust security with a Forescout option
Arista's zero-trust security framework segments devices into groups and sets policies for network access. Forescout integration is available for dynamic device identification. Continue Reading
-
Tip
02 Feb 2021
SASE hype includes SD-WAN, but does it need to?
Much of the hype around Secure Access Service Edge features the importance of SD-WAN with SASE, but do the two need each other to thrive? Research says probably not. Continue Reading
-
Tip
01 Feb 2021
How to monitor home network traffic for added security
When addressing home network monitoring, track all connected devices, and take advantage of open source tools, like packet capture, to sniff out malicious traffic. Continue Reading
-
Tip
29 Jan 2021
How the SolarWinds vulnerability affects networking
The SolarWinds attack resulted in a bevy of network vulnerabilities, like masked traffic and backdoor access. Network teams should take the time to review their security strategies. Continue Reading
-
Feature
22 Jan 2021
SolarWinds: Lessons learned for network management, monitoring
In this roundup of networking blogs, experts reveal the critical lessons learned from the SolarWinds hack in regard to network management and monitoring capabilities. Continue Reading
-
Tip
21 Jan 2021
Adopting threat hunting techniques, tactics and strategy
Adopt threat hunting techniques that analyze the right data, detect anomalies, use frameworks and compare success metrics, combining manual techniques with AI and machine learning. Continue Reading
-
Tip
20 Jan 2021
10 network security tips in response to the SolarWinds hack
From perimeter protection to persistent patching, enterprises should regularly review, update and test their network security plans, especially in response to the SolarWinds hack. Continue Reading
-
Tip
15 Jan 2021
Considerations for SASE management and troubleshooting
SASE opens new territory for network and security management and troubleshooting. Ultimately, teams should look for system usability and visibility into traffic flows and policies. Continue Reading
-
Tip
14 Jan 2021
SASE challenges include network security roles, product choice
Secure Access Service Edge blends network and security functions. While this integration has its benefits, enterprises still need to address some SASE challenges. Continue Reading
-
Tip
12 Jan 2021
How to calculate SASE return on investment and costs
SASE return on investment will vary for each organization, depending on use cases and architecture requirements. But the metrics used to determine ROI and cost factors are the same. Continue Reading
-
Tip
07 Jan 2021
Top 5 SASE use cases balance network connectivity, security
Secure Access Service Edge can enhance network performance and security controls for remote sites. Discover some of the other top SASE use cases and deployment options. Continue Reading
-
Feature
30 Dec 2020
5 networking startups helping enterprises adapt and prepare
Even in a global pandemic, these five networking startups continue to impress. Learn how their innovative technologies can help enterprises prepare for unforeseen challenges. Continue Reading
-
Feature
21 Dec 2020
Top network attacks of 2020 that will influence the decade
You've heard of phishing, ransomware and viruses. Now, keep them in mind because one cybersecurity expert says these threats and more may cause IT headaches for the next decade. Continue Reading
-
Feature
21 Dec 2020
Advice for an effective network security strategy
Security audits, evaluations of tools and looking realistically at trending technologies are some ways an organization can ensure its network security is the best it can be. Continue Reading
-
Quiz
21 Dec 2020
Test your network threats and attacks expertise in this quiz
Network security is an ever-changing subject, but many of its common threats have plagued IT pros for years -- and will likely continue to do so. See what you know in this quiz. Continue Reading
-
Tip
15 Dec 2020
Why it's SASE and zero trust, not SASE vs. zero trust
SASE and zero trust are hot infosec topics. But, when it comes to adoption, it's not a question of either/or, but using SASE to establish and enable zero-trust network access. Continue Reading
-
Tip
14 Dec 2020
How SASE convergence affects network and security roles
Most enterprises have siloed departments, but SASE's convergence of network and security functions could disrupt those constructs and drive more communication between teams. Continue Reading
-
Tip
11 Dec 2020
Software-defined home offerings drive remote productivity
Say hello to software-defined home, a 'branch of one' package that combines professional-grade Wi-Fi, security, SD-WAN and centralized management for remote workers. Continue Reading
-
Tip
11 Dec 2020
Building an effective security operations center framework
An effective security operations center framework combines monitoring and analysis platforms and threat intelligence services to help organizations respond to risks quickly. Continue Reading
-
Tip
03 Dec 2020
SASE model drives improved cloud and work-from-home security
Find out how the Secure Access Service Edge model provides increased work-from-home security and cloud access outside of the traditional enterprise data center access model. Continue Reading
-
Tip
20 Nov 2020
Implementing an SDP architecture for added network security
A key component of a software-defined perimeter requires client authentication before connection, while also making a network's internals invisible to outsiders. Continue Reading
-
Tip
12 Nov 2020
Microsegmentation networking: Nutanix Flow vs. VMware NSX HCI
Explore how microsegmentation improves network security and the differences in how Nutanix and VMware bring the technology to their software-defined hyper-converged infrastructures. Continue Reading
-
Answer
11 Nov 2020
How do VPN vs. cloud services compare for remote work?
As remote work becomes increasingly normal, IT teams must decide which remote access technologies will benefit employees more. VPN and cloud services are two top choices. Continue Reading
-
Feature
02 Nov 2020
Weighing the future of firewalls in a zero-trust world
Cybersecurity pros have been predicting the firewall's demise for years, yet the device is still with us. But does it have a place in zero-trust networks? One analyst says yes. Continue Reading
-
Tip
02 Nov 2020
Why networks should apply security by design principles
Security by design incorporates security and risk management directly into network architecture, using segmentation and Agile infrastructure design. Continue Reading
-
Tip
30 Oct 2020
Security automation tools and analytics reshape SecOps efforts
To transition from being reactive to proactive in terms of cybersecurity threats, check out how SecOps teams can use security analytics and automation tools to make the change. Continue Reading
-
Tip
29 Oct 2020
Understanding the zero trust-SDP relationship
Zero trust is a complicated framework that spans the IT stack. Find out how software-defined perimeter can address zero trust's network-level access requirements. Continue Reading
-
Tip
19 Oct 2020
Planning a zero-trust strategy in 6 steps
Launch a zero-trust strategy in six steps. Learn how to form a dedicated team, ask questions about existing security controls and evaluate the priority of zero-trust initiatives. Continue Reading
-
Tip
19 Oct 2020
Zero-trust implementation begins with choosing an on-ramp
Zero-trust security has three main on-ramps -- each with its own technology path. For a clear-cut zero-trust implementation, enterprises need to choose their on-ramp wisely. Continue Reading
-
Tip
19 Oct 2020
How to ensure a scalable SASE architecture
Don't assume all SASE architecture is the same, especially when it comes to scalability. Enterprises should consider distance to vendor PoPs, office locations and agent onboarding. Continue Reading
-
Opinion
12 Oct 2020
What are some VPN alternatives for remote access?
VPN security has its imperfections, especially when tracking user data and online activity. Some VPN alternatives may provide different security elements for users. Continue Reading
-
Answer
05 Oct 2020
How a network segmentation strategy works with SD-WAN
Legacy segmentation techniques are often unwieldy. But, as enterprises contemplate network segmentation with SD-WAN, they must understand their network environments and goals. Continue Reading
-
News
02 Oct 2020
Cisco to acquire container security specialist Portshift
Cisco's acquisition of Israeli startup Portshift would add essential security tools for companies that use the Kubernetes system for deploying cloud-native applications. Continue Reading
-
Answer
02 Oct 2020
What does a VPN concentrator do?
As more employees work remotely and VPN use rises, VPN concentrators have become trendy. But what does a VPN concentrator do exactly, and how do you deploy one? Continue Reading
-
Tip
28 Sep 2020
5G network security concerns and how to prepare for them
Enterprises looking forward to deploying 5G must first assess their security concerns upfront and review their policies and procedures, despite 5G's security improvements. Continue Reading
-
Feature
28 Sep 2020
Network monitoring market converges with security analytics
As cyber attacks increase and enterprise networks require threat detection and protection, network monitoring and security analytics are converging for more comprehensive visibility. Continue Reading
-
Tip
23 Sep 2020
What's involved in VPN maintenance and management?
Before an organization's VPN is up and running, IT teams must address four important aspects of VPN maintenance and management to keep abreast of transforming security concerns. Continue Reading
-
Answer
21 Sep 2020
Tips and tools for home network security monitoring
Homes now have more connected devices, which could become targets for hackers. Consequently, work-from-home employees should take certain steps to safeguard their networks. Continue Reading
-
Tip
18 Sep 2020
Top 4 firewall-as-a-service security features and benefits
Firewall-as-a-service offerings implement security policies across consolidated traffic headed to all locations. Learn about four security features and benefits of FWaaS. Continue Reading