The pervasive use of second screens endangers corporate IT networks
Despite techies having argued for years that having a second computer screen is a great way to improve productivity in the workplace, a new study from Gigamon has revealed …
Organizations need greater visibility into network activity
One of the biggest challenges for all organizations was a lack of agility, making it difficult for their teams to investigate and respond quickly and accurately to security …
Which SD-WAN products offer a notable return on investment?
Eight of the industry’s leading SD-WAN products were examined by NSS Labs to help enterprises understand the merits of products in the market and identify the capabilities …
Countering industrial cyberthreats with secure, standards-based, licensed wireless networks
Over the past few years, cyber threats aimed at a number of critical infrastructure targets have drawn our attention to the security of mission critical networks. These …
IoT explodes worldwide, researchers investigate security issues present in the devices real users own
About 40 percent of households across the globe now contain at least one IoT device, according to Avast. In North America, that number is almost double, at 66 percent, …
GSMA disproves false claims 5G systems will harm other services
The mobile industry has already demonstrated within leading international standards bodies that 5G can be used safely alongside other services, including weather sensing …
Appliance upgrades and excessive network latency delaying Office 365 deployments
Gateway appliance upgrades and excessive network latency continue to delay Office 365 deployments, according to Zscaler. Network congestion The survey showed that 41 percent …
Lack of visibility and IT staff availability: The main challenges of enterprise decentralization
As enterprise IT reckons with fundamental changes to their networking infrastructure, teams are being stretched to the limit, requiring a new approach to network monitoring …
Solving the network visibility problem with NaaS
Network visibility is crucial for many things: making sure that the equipment works properly monitoring and tweaking the network’s performance and protecting it against …
Is your perimeter inventory leaving you exposed? Why it’s time to switch from IP to DNS
Historically, security teams and tools have used IP addresses to define their targets and scopes. But in a world where applications and networks are increasingly cloud-hosted …
SD-WAN adoption growing as enterprises embrace app-centric architecture transition
The connected era and cloud-based environment have created a need to redesign network operations, according to ResearchAndMarkets. In addition, businesses find it …
High-risk vulnerability in Cisco’s secure boot process impacts millions of devices
Red Balloon Security has discovered a high-risk vulnerability in Cisco’s secure boot process which impacts a wide range of Cisco products in use among enterprise and …
Featured news
Resources
Don't miss
- Cisco fixes ClamAV vulnerability with available PoC and critical Meeting Management flaw
- SonicWall SMA appliances exploited in zero-day attacks (CVE-2025-23006)
- Defense strategies to counter escalating hybrid attacks
- Web Cache Vulnerability Scanner: Open-source tool for detecting web cache poisoning
- Funding soars in a milestone year for Israeli cybersecurity