Network Protocols and Security News
December 22, 2014
According to researchers, the most severe of several newly discovered Network Time Protocol security flaws can be exploited remotely with a single packet.
September 19, 2014
News roundup: Rogue cell phone towers are popping up across the United States, heightening enterprise communication and data privacy concerns. Plus: Goodwill breach update; Adobe patches released; and security in 2025.
June 30, 2014
A Gartner analyst says SDN security issues abound because of lacking security controls, little interoperability and shaky management features.
May 16, 2014
Uneven response efforts have left hundreds of thousands of servers and other devices vulnerable to the Heartbleed OpenSSL vulnerability.
Network Protocols and Security Get Started
Bring yourself up to speed with our introductory content
Expert Fernando Gont explains why underlying characteristics of IPv6 address-generation schemes may enable nodes to be targeted in IPv6 address-scanning attacks. Continue Reading
Old ways of securing physical networks are giving way to logical techniques. The change in traffic to an East-West, data-center-centric, software-defined-network model necessitates a new security plan. Continue Reading
The Secure Sockets Layer (SSL) is a computer networking protocol that manages server authentication, client authentication and encrypted communication between servers and clients. Continue Reading
Evaluate Network Protocols and Security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Multipath TCP could soon bring improved redundancy and uptime to a network near you, but what does it mean for network security? Expert Kevin Beaver explains. Continue Reading
The POODLE vulnerability was patched in October, yet new vulnerabilities are causing concern. Expert Michael Cobb discusses how to maintain SSL/TLS security in the enterprise. Continue Reading
Twenty-five gigabit Ethernet is reportedly the next big thing in Ethernet, but what are the security implications? Expert Kevin Beaver discusses. Continue Reading
Product ReviewsPowered by IT Central Station
Cost effective but when we originally purchased LANGuardian, some features needed further development.Powered by IT Central Station
Valuable Features: The ability to detect and decipher torrent traffic for the purpose of identifying what some refer to as "copyright...Continue Reading
Powered by IT Central Station
Valuable Features: Provides a detailed view of internet bandwidth consumption. • Improvements to My Organization: We can track users...Continue Reading
Delivers higher frequency of scans & better aggregation of results. Ticket management has room for improvement.Powered by IT Central Station
Valuable Features: Integrity of scanners; never do I need to worry….“Is this scanner going to bring down a host?”. • Improvements to My...Continue Reading
Manage Network Protocols and Security
Learn to apply best practices and optimize your operations.
IPv6 security expert Fernando Gont explains why IPv6 extension headers can inadvertently subvert security controls or foster denial-of-service conditions. Continue Reading
Malicious actors can exfiltrate sensitive data over VoIP, creating a security hole for enterprises. Expert Kevin Beaver explains how this attack is carried out and how to protect against it. Continue Reading
SilverSky CTO Andrew Jaquith says despite the recent Heartbleed flaw, the industry will stick with OpenSSL over commercially licensed SSL products. Jaquith also opines on the aftermath of the Target breach. Continue Reading
Problem Solve Network Protocols and Security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Third-party vendor management is important for avoiding incidents like the Target breach. Joseph Granneman offers four must-have security controls. Continue Reading
Large file transfers don't have to be scary. Learn four key steps to keeping your network secure when big files exit your enterprise. Continue Reading
Get help creating a network security strategy for IPv6 and learn if reputation-based security to filter IP traffic will work in a larger environment. Continue Reading