• The search for answers to ‘advanced threat’ defense

    Visibility into what is happening on your network may matter more than stopping an attack. Can technology keep up with advanced threats?Continue Reading

  • Combatting network threats: Look, Ma, no firewall!

    In this Q&A, a network engineer at the Rochester Institute of Technology explains his favorite weapons against network threats: user education and vulnerability scanning.Continue Reading

  • Are enterprises ready to use SDN yet?

    Software-defined networking (SDN) gained early traction with the companies that had the resources to deploy it and a clear, immediate need for its benefits: cloud providers, carriers and hyper-scale data center operators. They were eager to use SDN to make their networks more flexible, programmable and scalable. More importantly, they were willing to accept the possible hazards that come along with adopting a radically different network architecture.

    It was expected that SDN would soon trickle down to the enterprise. Yet even after several years, it turns out we're still in the early days, and many enterprises are not yet ready (or willing) to use SDN in their networks.

    It's time to look at realistic SDN use cases and deployment models for mainstream enterprises -- not just companies like Amazon and Google. In this issue of Network Evolution, learn more about how enterprises are likely to use SDN and if it will ever become the new normal in networking.

    Also in this issue, we explore what lessons network engineers can take away from the spate of high-profile network outages that affected companies such as United Airlines and the New York Stock Exchange earlier this year. Learn more about what's likely to take down your network and what steps enterprises can take to avoid it.

    Additionally, network engineers weigh in on the growing pressure to improve their fluency in security in light of the ongoing wave of data breaches and how it's affected their jobs.

    Continue Reading

  • Amid ongoing threats, network security training gains appeal

    Network engineers who have focused primarily on honing their routing and switching skills say having limited network security training is no longer adequate.Continue Reading

  • The CISO role's evolution from IT security to policy wonk

    As the need for a dedicated information security officer catches fire beyond firewalls, how should companies engineer the expanding CISO role?Continue Reading

  • Regaining control of cloud compliance

    As assets are moved to the cloud, organizations must take steps to ensure that cloud compliance requirements are upheld by third-party vendors. This is a major undertaking that requires knowledge of federal, state and international law; changing regulations; cloud security; and non-traditional information security controls and best practices. In this issue of Information Security magazine, we look at the shared responsibility model between organizations and service providers to protect data in the cloud.

    Many companies have elevated the visibility of the CISO function in response to a series of high-profile breaches. Some organizations are hiring fulltime CISOs for the first time. Others are shoring up their ranks. At mature organizations, it is not unusual to have board-level discussions about cyber-risk oversight, with concerns ranging from assets at risk, to information security responsibility and reporting structures. As the CISO position continues to be defined, we look at the role beyond IT.

    Investments in cybersecurity startups are taking off. Driven by CEO and board-level demand for promising technology aimed at protecting corporate networks and sensitive data, investors are pouring money into cybersecurity companies. While most investments are aimed at turning a profit for venture-capital firms, some companies are investing to reap the benefits of working with new technology and influence product development. We look at strategic partnerships and how funding startups can pay off.Continue Reading

  • Rethinking network monitoring software for the user experience

    Just because the dashboard in your network monitoring software shows that everything is functional doesn't guarantee it's functioning well for users.Continue Reading

  • Steps to take in order to secure virtual machines

    Something as small as a flash drive can be a danger to your virtual machines and the data inside them. Make sure to keep your info secure.Continue Reading

  • What switched PDU should I buy?

    Our latest firewall/VPN firmware upgrade left CPU usage at 100%. A malfunctioning DHCP-Server means people aren't getting IPs. I have to pull the plug to restart the firewall. What size switched PDU do I get?Continue Reading

  • Tips for deploying cloud applications on GCE

    Cloud application developers should select an IaaS platform carefully. To aid your selection, here are pros and cons of deploying cloud applications on GCE.Continue Reading

  • Why micro-segmentation is good for server admins

    Network micro-segmentation promises better security, but another primary benefit may be easier administration.Continue Reading

  • Layered security approach can thwart VoIP attacks

    A strategically placed firewall within your network infrastructure can help mitigate VoIP attacks. But encryption and proxy services add enhanced security.Continue Reading

  • Using a VMware firewall as part of a defense-in-depth strategy

    While it is not the Holy Grail of network security, VMware firewall technologies are critical components of protecting a virtual data center. Expert Paul Henry explains why.Continue Reading

  • Don't let BYOD legal issues sink your BYOD initiative

    Companies best be aware of the legal issues that accompany their BYOD initiatives, mobility consultant Bryan Barringer explains in part one of this webcast series.Continue Reading

  • Network-based controls: Securing the Internet of things

    Devices may not connect to enterprise access systems or inventory and patching mechanisms. Take back control with these widely used network protocols.Continue Reading