• EC2 Security Group bundles security policy for instances

    With a few exceptions, AWS customers have little control over the location or configuration of cloud infrastructure. EC2 Security Groups and Network Access Control Lists help protect workloads.Continue Reading

  • Draw up a data center network diagram you'll actually use

    Creating a data center network diagram is time-consuming but necessary work. Keep the scope narrow and know the priorities of your diagram to save time and energy.Continue Reading

  • PaaS provider hinges on four factors

    Selecting a PaaS provider involves many steps. Learn the top four considerations when making this decision.Continue Reading

  • Tips for generating the perfect VM image

    Image-based VM deployments can dramatically increase consistency when creating new VMs. Use these tips to configure the perfect VM on the first try.Continue Reading

  • Adjusting your network perimeter security

    Expert Johna Till Johnson explains how the enterprise perimeter became obsolete, and how to replace network perimeter security with an approach to perimeterless security.Continue Reading

  • The search for answers to ‘advanced threat’ defense

    Visibility into what is happening on your network may matter more than stopping an attack. Can technology keep up with advanced threats?Continue Reading

  • Combatting network threats: Look, Ma, no firewall!

    In this Q&A, a network engineer at the Rochester Institute of Technology explains his favorite weapons against network threats: user education and vulnerability scanning.Continue Reading

  • Are enterprises ready to use SDN yet?

    Software-defined networking (SDN) gained early traction with the companies that had the resources to deploy it and a clear, immediate need for its benefits: cloud providers, carriers and hyper-scale data center operators. They were eager to use SDN to make their networks more flexible, programmable and scalable. More importantly, they were willing to accept the possible hazards that come along with adopting a radically different network architecture.

    It was expected that SDN would soon trickle down to the enterprise. Yet even after several years, it turns out we're still in the early days, and many enterprises are not yet ready (or willing) to use SDN in their networks.

    It's time to look at realistic SDN use cases and deployment models for mainstream enterprises -- not just companies like Amazon and Google. In this issue of Network Evolution, learn more about how enterprises are likely to use SDN and if it will ever become the new normal in networking.

    Also in this issue, we explore what lessons network engineers can take away from the spate of high-profile network outages that affected companies such as United Airlines and the New York Stock Exchange earlier this year. Learn more about what's likely to take down your network and what steps enterprises can take to avoid it.

    Additionally, network engineers weigh in on the growing pressure to improve their fluency in security in light of the ongoing wave of data breaches and how it's affected their jobs.

    Continue Reading

  • Amid ongoing threats, network security training gains appeal

    Network engineers who have focused primarily on honing their routing and switching skills say having limited network security training is no longer adequate.Continue Reading

  • The CISO role's evolution from IT security to policy wonk

    As the need for a dedicated information security officer catches fire beyond firewalls, how should companies engineer the expanding CISO role?Continue Reading

  • Regaining control of cloud compliance

    As assets are moved to the cloud, organizations must take steps to ensure that cloud compliance requirements are upheld by third-party vendors. This is a major undertaking that requires knowledge of federal, state and international law; changing regulations; cloud security; and non-traditional information security controls and best practices. In this issue of Information Security magazine, we look at the shared responsibility model between organizations and service providers to protect data in the cloud.

    Many companies have elevated the visibility of the CISO function in response to a series of high-profile breaches. Some organizations are hiring fulltime CISOs for the first time. Others are shoring up their ranks. At mature organizations, it is not unusual to have board-level discussions about cyber-risk oversight, with concerns ranging from assets at risk, to information security responsibility and reporting structures. As the CISO position continues to be defined, we look at the role beyond IT.

    Investments in cybersecurity startups are taking off. Driven by CEO and board-level demand for promising technology aimed at protecting corporate networks and sensitive data, investors are pouring money into cybersecurity companies. While most investments are aimed at turning a profit for venture-capital firms, some companies are investing to reap the benefits of working with new technology and influence product development. We look at strategic partnerships and how funding startups can pay off.Continue Reading

  • Rethinking network monitoring software for the user experience

    Just because the dashboard in your network monitoring software shows that everything is functional doesn't guarantee it's functioning well for users.Continue Reading

  • Steps to take in order to secure virtual machines

    Something as small as a flash drive can be a danger to your virtual machines and the data inside them. Make sure to keep your info secure.Continue Reading

  • What switched PDU should I buy?

    Our latest firewall/VPN firmware upgrade left CPU usage at 100%. A malfunctioning DHCP-Server means people aren't getting IPs. I have to pull the plug to restart the firewall. What size switched PDU do I get?Continue Reading

  • Tips for deploying cloud applications on GCE

    Cloud application developers should select an IaaS platform carefully. To aid your selection, here are pros and cons of deploying cloud applications on GCE.Continue Reading