networking
Thwarting attacks with genetically-inspired computer configuration systems
In the seemingly unending search for computer security solutions that are both reactive and proactive, researchers have occasionally turned to other sciences for ideas. In …
The Internet of Things: Key Applications and Protocols
The Internet of Things describes the Home Area Networking, Building Automation and AMI protocols and their evolution towards open protocols based on IP such as 6LowPAN and …
Intel details next-generation communications platform
Intel disclosed several features for the company’s next-generation communications platform, codenamed Crystal Forest. The platform will handle data processing across the …
Mobile hacks to increase with SDR adoption
Digital Assurance warned that mobile communications operating over radio systems such as GSM, WiMax and DECT are likely to become more heavily targeted as Software Defined …
Building Resilient IP Networks
More companies are building networks with the intention of using them to conduct business. Because the network has become such a strategic business tool, its availability is …
Security for IT consumerization
Lancope announced that its StealthWatch System extends network visibility to mobile devices for the security of bring-your-own-device (BYOD) environments. By analyzing mobile …
Wireless security and the enterprise
Jesse Frankel is the head of the AirMagnet Intrusion Research Team. He has been working in various areas of wireless LAN technology and applications for more than 15 years. …
Planning for IPv6
With IPv4 network addresses close to depletion, moving to IPv6 is now business critical. This concise book helps you plan for IPv6 integration by providing a high-level …
Network Warrior, 2nd Edition
If you are interested in knowing everything that you can possibly know about networking, chances are you were already urged to read Gary Donahue's Network Warrior. Four years …
Continuous monitoring of network infrastructures
Skybox Security announced Skybox Network Assurance 6.0, a solution for continuous monitoring of network infrastructures. New versions of FFIEC, PCI, FISMA and other …
Cisco updates switching portfolio
According to the Cisco Cloud Index, more than 50 percent of computing workloads in data centers will be cloud-based by 2014, and global cloud traffic will grow more than 12 …
Sophos wireless access point supports 5 GHz connections
Sophos announced the Astaro AP50, its new dual-band/dual-radio capable wireless access point. The new addition to Astaro’s wireless access point family supports both …
Featured news
Resources
Don't miss
- Quantum threats are already active and the defense response remains fragmented
- Top must-visit companies at RSAC 2026
- Oracle issues emergency fix for pre-auth RCE in Identity Manager (CVE-2026-21992)
- Your AI agents are moving sensitive data. Do you know where?
- Plumber: Open-source scanner of GitLab CI/CD pipelines for compliance gaps