Please turn on your JavaScript for this page to function normally.
SD-WAN
Best practices when implementing SD-WAN

Telecoms is an overall complex business – delivering network circuits and optimizing connections – but SD-WAN has its own very specific set of obstacles. SD-WAN involves many …

connection
You can’t fix what you can’t see: A new way of looking at network performance

Network performance, or the service quality of a business’ network, is critical to running a successful enterprise. Imagine the cost to an organization when the corporate …

connection
Branching out more efficiently and securely with SD-WAN

As enterprises expand, through organic growth or acquisition, they need to support the IT needs of more distributed locations. These often include teams in shared office …

Juniper Networks
Juniper releases barrage of security fixes for security, networking devices

Juniper Networks has released patches for vulnerabilities affecting its networking and security devices running Junos OS, as well as a bucketload of security flaws in the …

cables
Hardware is on its way out as the demand for SD-WAN climbs

In today’s world applications are moving to the cloud and employee mobility is on the rise, which adds unprecedented flexibility and agility. However, this drive towards …

network
Security should be a top priority when transitioning to an SD-WAN solution

Barracuda Networks today released key findings from a new global research report, “Security, Connectivity, and Control: The Challenges and Opportunities of …

cloud
Legacy government networks stifle cloud migration

67 percent of government agencies’ legacy network infrastructures are simply not prepared to handle the cloud migration lift or keep pace with the changing demands of cloud …

mobile devices
Mobile security threats: Lack of visibility is putting businesses at risk

A significant lack of visibility into devices and networks is putting businesses at risk for data leakage and phishing attacks, according to a study conducted by Enterprise …

router
Regularly updating your wireless router is not enough to ward off attacks

Wireless routers are the most often attacked and exploited type of IoT device. They are also one of the rare IoT devices that most of us can’t do without. We need them …

TL-WR841N
Popular TP-Link wireless home router open to remote hijacking

By concatenating a known improper authentication flaw with a newly discovered CSRF vulnerability, remote unauthenticated attackers can obtain full control over TP-Link …

The Linux Foundation
Are communications service providers confident in open source networking solutions?

The Linux Foundation announced the results of an industry survey to gauge industry perceptions of open source across networking technologies. Top takeaways from the survey …

spray-on antenna
Researchers develop invisibly thin spray-on antennas

The promise of wearables, functional fabrics, the Internet of Things, and their “next-generation” technological cohort seems tantalizingly within reach. But …

Don't miss

Cybersecurity news