Please turn on your JavaScript for this page to function normally.
network
How are organizations protecting their critical IT assets?

Telos unveiled findings from a research conducted by Vanson Bourne that explores how organizations approach network and critical IT asset protection. The study, which polled …

zero
The role of visibility and analytics in zero trust architectures

Zero trust architecture (ZTA) is not a new concept, but with the White House Executive Order published earlier this year, many in the networking space have started to ask …

data
Most cybersecurity leaders use microsegmentation to augment corporate network security

In today’s era of remote employees and an ever expanding variety of connected devices, network security is becoming increasingly complex. To compensate, cybersecurity …

DDoS
Blocked DDoS events up 75% in the first nine months of 2021

Radware has published results from its report which provides an overview of the DDoS attack landscape, application attack developments, and unsolicited network scanning …

zero
Network and IoT security in a zero trust security model

You can never be too careful when it comes to network and IoT security. With a rapidly growing number of disparate devices being connected to corporate and industrial …

mobile work
Embracing secure hybrid work with four foundational IT controls

Hybrid work has become the norm for many businesses. In fact, a 2021 survey conducted by HR consulting firm Mercer found that out of a group of 510 employers with flexible …

IoT
Security changes needed to protect corporate networks from non-business IoT devices

Cyber adversaries know that one small IoT sensor can provide entry into a corporate network to launch ransomware attacks and more. According to a survey of IT decision-makers …

SASE
SASE emerges as the edge becomes an enterprise focal point

Network attacks continue to proliferate, especially sophisticated probing of user domain registries, ransomware attacks, and malware injections via trojans. To further …

passwordless
IT leaders confident in their organization’s network security, IT managers have doubts

While IT leaders believe they have strong security practices in place, their continual search for additional network security capabilities suggests that this confidence may be …

AI
CSPs deploying AI to improve customer experience and reduce operational costs

Communication Service Providers (CSPs) are making AI deployments an immediate priority to improve service experience for customers and reduce operational costs, an Anodot …

NetOps
NetOps investment soaring, driven mostly by digital transformation

87% of network managers, network architects and network engineers say their organizations have increased their investment in NetOps over the past two years, with just 5% …

criminal
How to protect the corporate network from spyware

It used to be easy for network administrators to identify where corporate boundaries are; they were usually where the external and internal networks meet. That made it easy …

Don't miss

Cybersecurity news