
Blocked DDoS events up 75% in the first nine months of 2021
Radware has published results from its report which provides an overview of the DDoS attack landscape, application attack developments, and unsolicited network scanning …

Network and IoT security in a zero trust security model
You can never be too careful when it comes to network and IoT security. With a rapidly growing number of disparate devices being connected to corporate and industrial …

Embracing secure hybrid work with four foundational IT controls
Hybrid work has become the norm for many businesses. In fact, a 2021 survey conducted by HR consulting firm Mercer found that out of a group of 510 employers with flexible …

Security changes needed to protect corporate networks from non-business IoT devices
Cyber adversaries know that one small IoT sensor can provide entry into a corporate network to launch ransomware attacks and more. According to a survey of IT decision-makers …

SASE emerges as the edge becomes an enterprise focal point
Network attacks continue to proliferate, especially sophisticated probing of user domain registries, ransomware attacks, and malware injections via trojans. To further …

IT leaders confident in their organization’s network security, IT managers have doubts
While IT leaders believe they have strong security practices in place, their continual search for additional network security capabilities suggests that this confidence may be …

CSPs deploying AI to improve customer experience and reduce operational costs
Communication Service Providers (CSPs) are making AI deployments an immediate priority to improve service experience for customers and reduce operational costs, an Anodot …

NetOps investment soaring, driven mostly by digital transformation
87% of network managers, network architects and network engineers say their organizations have increased their investment in NetOps over the past two years, with just 5% …

How to protect the corporate network from spyware
It used to be easy for network administrators to identify where corporate boundaries are; they were usually where the external and internal networks meet. That made it easy …

5G trends accelerating, all major regions pursuing 5G Core testing and deployments
5G trends are continuing to accelerate, with 5G SA Core evaluation, testing and launch activities growing significantly across all geographic regions, according to Spirent. In …

9 tips to avoid cloud configuration conundrums
Configuration-related errors continue to result in avoidable losses of customer data and, consequently, their trust and loyalty, as well as revenue. The recent T-Mobile breach …

Networking issues enterprises must address to improve business and operational efficiency
Enterprises have been forced to adapt to a new state of “normal,” shifting from traditional office-based operations to distributed environments that must still …
Featured news
Resources
Don't miss
- Kali Linux 2025.2 delivers Bloodhound CE, CARsenal, 13 new tools
- iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)
- Unpacking the security complexity of no-code development platforms
- Researchers warn of ongoing Entra ID account takeover campaign
- LockBit panel data leak shows Chinese orgs among the most targeted