NETWORK SECURITY

EXPERT ANALYSIS


Better Together: Net Managers are Partnering with the Security Team

Shamus McGillicuddy News
  • Network managers need to be open to an expanded partnership with the security group. A new EMA report finds such collaboration is already underway in many organizations.
    By Shamus McGillicuddy , 9/19/2018

The 5 Biggest Mistakes in SD-WAN Security

John Edwards News
  • Simply committing to SD-WAN security isn't enough. It's also necessary to create defenses the right way and avoid some common mistakes.
    By John Edwards , 8/29/2018

Get Developers on Board with Application Security

Lori MacVittie News
  • Application security requires collaboration between developers and security ops. Organizations need to align expectations of the two groups and shift security to the left, into the development pipeline. 
    By Lori MacVittie , 8/28/2018

3 Strategies to Fight Network Siloes

John Maddison, SVP of Products and Solutions, Fortinet Commentary
  • The problems created by old hub-and-spoke network architectures are happening again with the advent of the cloud. Following these strategies can avoid building a new set of siloes.
    By John Maddison, SVP of Products and Solutions, Fortinet , 8/23/2018

Skills Network Managers Need in the Age of AI

Mike Leibovitz Slideshow
  • Organizations are beginning to invest in the infrastructure to support artificial intelligence, requiring network managers to bone up on skills including data science and security.
    By Mike Leibovitz , 8/20/2018

Going Cloud First: Risks to Consider

Archana Kesavan Commentary
  • Companies are always concerned about cloud security, but may overlook other factors in cloud adoption, such as the impact on performance.
    By Archana Kesavan , 8/17/2018

Improving DevOps Security Practices

Brett Johnson News
  • Security is often an afterthought, but DevOps engineers should make it a priority by taking these factors into consideration.
    By Brett Johnson , 8/16/2018

Troubleshooting Application Configuration for Security

Tony Fortunato Commentary
  • In this video, Tony Fortunato uses Wireshark to show you how to get an application to run through a firewall.
    By Tony Fortunato , 8/14/2018

Cloud Intelligence Throwdown: Amazon vs. Google vs. Microsoft

Kelly Sheridan News
  • A closer look at native threat intelligence capabilities built into major cloud platforms and discussion of their strengths and shortcomings.
    By Kelly Sheridan , 8/10/2018

Network Security Shrinks to Zero-Trust

Daniel Conde Commentary
  • The traditional network security perimeter has become smaller and smaller as attackers become more sophisticated. But how practical is the zero-trust model?
    By Daniel Conde , 8/09/2018

How to Configure 2 IP Addresses

Tony Fortunato Commentary
  • There are multiple occasions for which you may need two IPv4 addresses. This video from Tony Fortunato explains how to configure them.
    By Tony Fortunato , 8/08/2018

Network Security Analysis: A New Approach

Adam Wick, Research Lead, Mobile Security & Systems Software, Galois Commentary
  • A collaborative, peer-to-peer strategy provides several advantages over the traditional siloed approach to detecting and mitigating cyberthreats.
    By Adam Wick, Research Lead, Mobile Security & Systems Software, Galois , 8/03/2018

Multifactor Acquisition: Cisco Plans to Buy Duo for $2.35B

Kelly Sheridan News
  • Cisco intends to use Duo's authentication technology to ramp up security across hybrid and multicloud environments.
    By Kelly Sheridan , 8/02/2018

Applying AI to Network Analytics

John Edwards News
  • AI-powered analytics can streamline network performance and slash costs, but only when humans properly apply the technology.
    By John Edwards , 8/02/2018

Selecting an ISP for Business: Factors to Consider

Dan Conde Commentary
  • Price is an obvious consideration when picking an ISP, but security and co-location services are among other important criteria to consider.
    By Dan Conde , 7/31/2018

Authentication Lab: Configuring TACACS+ and RADIUS

David Bombal Commentary
  • In this series of videos, David Bombal shows you how to configure both authentication protocols for network access control.
    By David Bombal , 7/03/2018

WPA3 Brings New Authentication and Encryption to WiFi

Curtis Franklin News
  • The Wi-Fi Alliance officially launches its latest protocol, which offers new capabilities for personal, enterprise, and IoT wireless networks.
    By Curtis Franklin , 6/26/2018

Nmap Tutorial: Host Discovery

Packt Publishing Commentary
  • In this excerpt from "Nmap: Network Exploration and Security Auditing Cookbook - Second Edition," learn how to perform a ping scan to find live hosts in your network.
    By Packt Publishing , 6/20/2018

Port Scanning Techniques: An Introduction

Packt Publishing Commentary
  • In this excerpt from "Kali Linux Network Scanning Cookbook-Second Edition," learn the basics of port scanning for network security.
    By Packt Publishing , 6/07/2018

Microservices Management: Securing Endpoints

Lori MacVittie Commentary
  • The proliferation of microservices can create a sense of loss of control. Here's what you can do to secure them.
    By Lori MacVittie , 5/29/2018