networking
Cisco updates its Unified Computing System
IT organizations today are striving to establish data centers that support virtualization and cloud computing to become more competitive and agile, reduce the cost of physical …
New server line-up based on Intel Xeon Processor E5 family
Hitachi Data Systems will expand its blade and rack server products, based on the new Intel Xeon processor E5-2600 product family introduced by Intel. Hitachi Data Systems …
Big data solution for network traffic
Bivio NetFalcon is the first big data solution for network traffic that performs real-time analytics on long-term, large scale records of network communications. Currently …
Network-wide anomaly detection and packet forensics
Endace launched OSm 5.0, the latest software release for their range of accurate high speed network monitoring and recording systems. OSm 5.0 offers: Real time indexing of …
Metasploit identifies IPv6 security risks
Rapid7 announced that the new version of Metasploit 4.2 allows users to fully test whether IPv6 addresses on their network are vulnerable to cyber attacks. This is …
Thwarting attacks with genetically-inspired computer configuration systems
In the seemingly unending search for computer security solutions that are both reactive and proactive, researchers have occasionally turned to other sciences for ideas. In …
The Internet of Things: Key Applications and Protocols
The Internet of Things describes the Home Area Networking, Building Automation and AMI protocols and their evolution towards open protocols based on IP such as 6LowPAN and …
Intel details next-generation communications platform
Intel disclosed several features for the company’s next-generation communications platform, codenamed Crystal Forest. The platform will handle data processing across the …
Mobile hacks to increase with SDR adoption
Digital Assurance warned that mobile communications operating over radio systems such as GSM, WiMax and DECT are likely to become more heavily targeted as Software Defined …
Building Resilient IP Networks
More companies are building networks with the intention of using them to conduct business. Because the network has become such a strategic business tool, its availability is …
Security for IT consumerization
Lancope announced that its StealthWatch System extends network visibility to mobile devices for the security of bring-your-own-device (BYOD) environments. By analyzing mobile …
Wireless security and the enterprise
Jesse Frankel is the head of the AirMagnet Intrusion Research Team. He has been working in various areas of wireless LAN technology and applications for more than 15 years. …
Featured news
Resources
Don't miss
- Threat actors are scanning your environment, even if you’re not
- GoSearch: Open-source OSINT tool for uncovering digital footprints
- Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
- Top must-visit companies at RSAC 2025
- Critical Commvault RCE vulnerability fixed, PoC available (CVE-2025-34028)