Remove Article Remove Network Remove Security
article thumbnail

As the networks evolve enterprises need to rethink network security

Network World

Data and applications are at the hub of new business models, and data needs to travel across the extended network at increasingly high speeds without interruption. Networks are faster than ever before, more agile and software-driven. Networks are faster than ever before, more agile and software-driven.

Network 215
article thumbnail

Counterfeit Cisco switches raise network security alarms

Network World

In a disconcerting event for IT security professionals, counterfeit versions of Cisco Catalyst 2960-X Series switches were discovered on an unnamed business network, and the fake gear was found to be designed to circumvent typical authentication procedures, according to a report from F-Secure.

Network 210
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

10 essential Linux tools for network and security pros

Network World

Picking just 10 Linux open source security tools isn’t easy, especially when network professionals and security experts have dozens if not several hundred tools available to them. There are different sets of tools for just about every task—network tunneling, sniffing, scanning, mapping.

Linux 205
article thumbnail

Google Cloud adds networking, security features for enterprises

Network World

Google Cloud is rolling out new network and security features, including a service that provides Layer-7 security. The new offerings announced at Google Cloud Next also include firewall and web application-protection options aimed at advancing existing cloud connectivity and ensuring the security of cloud-based resources. “We

Network 199
article thumbnail

NSA urges businesses to adopt zero trust for network security

Network World

The National Security Agency this week detailed recommendations for businesses to secure their network infrastructure against attacks, giving safe configuration tips for commonly used networking protocols and urging the use of basic security measures for all networks.

Network 199
article thumbnail

3 steps to improve collaboration between networking and security pros

Network World

(Enterprise Management Associates finds that enterprises are trying to improve collaboration between their network-infrastructure and operations teams and their information-security and cybersecurity teams. To read this article in full, please click here

Network 195
article thumbnail

How and why automation can improve network-device security

Network World

The recent T-Mobile data breach , reportedly facilitated by attackers gaining access to an unprotected router and from there into the network, could have been prevented through the use of network automation. IDS, IPS, SASE, and other newer technologies get a lot more attention, but automation is critical to modern network security.

Network 195