Net Security
Expert Analysis
Security Starts With The Network
Brendan Ziolo, Head of Large Enterprise Strategy, Alcatel-LucentCommentary
With cyberattacks and data breaches on the rise, enterprises need to build their defenses on the foundation of a secure network.
By Brendan Ziolo Head of Large Enterprise Strategy, Alcatel-Lucent,
CommentPost a comment  |  Read  |  Post a Comment
IT Spending In 2016: Slower Growth Expected
Network Computing Editors, News
Forecast for IT budgets this year indicates less growth and priorities on security, business applications, and network infrastructure.
By Network Computing Editors ,
Comment4 comments  |  Read  |  Post a Comment
Hottest Tech Jobs Of 2016
Susan Fogarty, Editor in Chief
If finding a new job in 2016 is among your New Year's resolutions, look no further than these tech positions in the most demand.
By Susan Fogarty Editor in Chief,
Comment11 comments  |  Read  |  Post a Comment
Micro-segmentation: Split And Smear Security
Network Computing, ContributorCommentary
Centralized, hardware-based security doesn't scale in modern data center networks. Distributed firewalling in software overcomes the limitations.
By Bruno Germain, Systems Engineer, VMware ,
CommentPost a comment  |  Read  |  Post a Comment
IT Pros Brace For Holiday Nightmares
Network Computing Editors, News
While other employees are taking time off or partying it up during the holiday season, IT teams are busy fixing problems, according to an Ipswitch poll.
By Network Computing Editors ,
CommentPost a comment  |  Read  |  Post a Comment
Juniper Discovers Unauthorized Code In Its Firewall OS
Jai Vijayan, Freelance writerNews
Code was designed to decrypt VPN communication and enable remote administrative control of devices.
By Jai Vijayan Freelance writer,
Comment19 comments  |  Read  |  Post a Comment
Security Measures For Today's Networks
Network Computing, ContributorCommentary
In an increasingly sophisticated threat environment, organizations need to ramp up their network security beyond firewalls and virus scanners.
By Jason Dover, Director of Product Line Management, KEMP Technologies ,
Comment2 comments  |  Read  |  Post a Comment
Networking Challenges For 2016 And Beyond
Patrick Hubbard, Head Geek & Director of Technical Product Marketing, SolarWindsCommentary
Network administrators are bracing for the proliferation of IoT devices, escalating security threats, and tight budgets ahead.
By Patrick Hubbard Head Geek & Director of Technical Product Marketing, SolarWinds,
Comment4 comments  |  Read  |  Post a Comment
Decoding SMTP Authentication Using Wireshark
Tony Fortunato, Owner, The Technology FirmEducation
In this video, Tony Fortunato shows how Wireshark can decrypt the Base54 encoding on an SMTP trace file.
By Tony Fortunato Owner, The Technology Firm,
Comment1 Comment  |  Read  |  Post a Comment
7 Best Practices For IoT Security
Network Computing Editors,
Along with tremendous opportunity, the Internet of Things brings enormous exposure to security risks. IT organizations must invest in a variety of security practices and resources to strengthen their protection.
By Network Computing Editors ,
Comment3 comments  |  Read  |  Post a Comment
Cisco Adds To ACI
Marcia Savage, Managing Editor, Network ComputingNews
Docker container support and enhanced security are among the new features in Cisco’s software-defined networking platform.
By Marcia Savage Managing Editor, Network Computing,
Comment1 Comment  |  Read  |  Post a Comment
Why We Need To Move Beyond Passwords
Isaac Potoczny-Jones, Research Lead of Computer Security at GaloisCommentary
Password security is inadequate as mobile devices proliferate and the Internet of Things ecosystem expands.
By Isaac Potoczny-Jones Research Lead of Computer Security at Galois,
Comment5 comments  |  Read  |  Post a Comment
Cisco Cert Tracker Offline After Pearson VUE Breach
Marcia Savage, Managing Editor, Network ComputingNews
Third-party certification credential manager used by Cisco and others is taken down after malware infection.
By Marcia Savage Managing Editor, Network Computing,
Comment10 comments  |  Read  |  Post a Comment
IoT Security & Privacy: Reducing Vulnerabilities
Isaac Potoczny-Jones, Research Lead of Computer Security at GaloisCommentary
Ensuring data security and privacy in IoT networks means taking a different approach and building protection in from the start.
By Isaac Potoczny-Jones Research Lead of Computer Security at Galois,
Comment20 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Slideshows
Cartoon
White Papers
Register for Network Computing Newsletters
Current Issue
Twitter Feed