Please turn on your JavaScript for this page to function normally.
router
Routers from well-known manufacturers vulnerable to cross-router data leaks

While many organizations and home networks use a host and guest network on the same router hardware to increase security, a new study by Ben-Gurion University indicates that …

nmap
Nmap 7.80 released: A mature Npcap Windows packet capturing driver, 11 new NSE scripts

Nmap is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network …

world
Security flaw could turn load balancers into beachheads for cyber attacks

Cyber security provider F-Secure is advising organizations using F5 Networks’ BIG-IP load balancer, which is popular amongst governments, banks, and other large corporations, …

Cisco
Critical holes plugged in Cisco 220 Series smart switches

Cisco has fixed three vulnerabilities in its Cisco 220 Series smart switches and is urging owners to upgrade their firmware as soon as possible. Among these are two critical …

SD-WAN
SD-WAN continues to be one of the fastest-growing segments of the network infrastructure market

The SD-WAN infrastructure market will grow at a 30.8% compound annual growth rate (CAGR) from 2018 to 2023 to reach $5.25 billion, according to IDC’s SD-WAN …

bomb
50% of organizations believe attackers can infiltrate their networks each time they try

As organizations increase investments in automation and agility, a general lack of awareness about the existence of privileged credentials – across DevOps, robotic process …

SD-WAN
Skills gap remains a top barrier to SD-WAN adoption

SD-WAN security drives selection, skills gaps remain a primary obstacle to adoption, and adoption continues to rise, according to Masergy. The survey, conducted in partnership …

5G
The true potential of 5G for businesses

Technology is transforming our world beyond recognition and both public and private sector organizations are at a tipping point where they must embrace digital transformation …

Network
Over 80% of network teams play a role in security efforts

More than 4 in 5 IT teams are involved in security efforts, and a majority of them report an increase of at least 25 percent in time spent on these efforts over the past 12 …

satellite
New satellite constellations aim to improve IoT connectivity options

By 2024, there will be 24 million IoT connections made via satellite, ABI Research reveals. A new report unveils the long-term opportunity within the satellite space for the …

magnify
Discovering and fingerprinting BACnet devices

BACnet is a communication protocol deployed for building automation and control networks. The most widely accepted networks include Internet Protocol (BACnet/IP) and the …

dual monitors
The pervasive use of second screens endangers corporate IT networks

Despite techies having argued for years that having a second computer screen is a great way to improve productivity in the workplace, a new study from Gigamon has revealed …

Don't miss

Cybersecurity news