![world](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113423/world-400x200.jpg)
Security flaw could turn load balancers into beachheads for cyber attacks
Cyber security provider F-Secure is advising organizations using F5 Networks’ BIG-IP load balancer, which is popular amongst governments, banks, and other large corporations, …
![Cisco](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094049/cisco1-400x200.jpg)
Critical holes plugged in Cisco 220 Series smart switches
Cisco has fixed three vulnerabilities in its Cisco 220 Series smart switches and is urging owners to upgrade their firmware as soon as possible. Among these are two critical …
![SD-WAN](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093756/SD-WAN-400x200.png)
SD-WAN continues to be one of the fastest-growing segments of the network infrastructure market
The SD-WAN infrastructure market will grow at a 30.8% compound annual growth rate (CAGR) from 2018 to 2023 to reach $5.25 billion, according to IDC’s SD-WAN …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112750/bomb-400x200.jpg)
50% of organizations believe attackers can infiltrate their networks each time they try
As organizations increase investments in automation and agility, a general lack of awareness about the existence of privileged credentials – across DevOps, robotic process …
![SD-WAN](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093927/sdwan-400x200.jpg)
Skills gap remains a top barrier to SD-WAN adoption
SD-WAN security drives selection, skills gaps remain a primary obstacle to adoption, and adoption continues to rise, according to Masergy. The survey, conducted in partnership …
![5G](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094122/5G-2-400x200.jpg)
The true potential of 5G for businesses
Technology is transforming our world beyond recognition and both public and private sector organizations are at a tipping point where they must embrace digital transformation …
![Network](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102932/network-bot-400x200.jpg)
Over 80% of network teams play a role in security efforts
More than 4 in 5 IT teams are involved in security efforts, and a majority of them report an increase of at least 25 percent in time spent on these efforts over the past 12 …
![satellite](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094351/satellite-400x200.jpg)
New satellite constellations aim to improve IoT connectivity options
By 2024, there will be 24 million IoT connections made via satellite, ABI Research reveals. A new report unveils the long-term opportunity within the satellite space for the …
![magnify](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094422/magnify-inspect1-400x200.jpg)
Discovering and fingerprinting BACnet devices
BACnet is a communication protocol deployed for building automation and control networks. The most widely accepted networks include Internet Protocol (BACnet/IP) and the …
![dual monitors](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09094001/dual-monitors-400x200.jpg)
The pervasive use of second screens endangers corporate IT networks
Despite techies having argued for years that having a second computer screen is a great way to improve productivity in the workplace, a new study from Gigamon has revealed …
![eye](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094026/eye-400x200.jpg)
Organizations need greater visibility into network activity
One of the biggest challenges for all organizations was a lack of agility, making it difficult for their teams to investigate and respond quickly and accurately to security …
![SD-WAN](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094540/sdwan-400x200.jpg)
Which SD-WAN products offer a notable return on investment?
Eight of the industry’s leading SD-WAN products were examined by NSS Labs to help enterprises understand the merits of products in the market and identify the capabilities …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD