May 20, 2016
The most common data center operating system gets its final 6.x updates with the addition of a local backup archiving tool before transitioning to just security and stability updates.
April 22, 2016
Apple's enterprise security features draw praise from IT pros who say iOS data protection and encryption make the operating system a strong business platform.
March 02, 2016
Diffie, Hellman receive Turing Award and experts review cryptography research, Apple vs. FBI, Juniper backdoors, quantum crypto and the future of cryptography.
February 19, 2016
Securing AWS starts with knowing what mistakes to avoid. So, to get off on the right foot, learn from these cautionary tales of common AWS security blunders.
VPN Get Started
Bring yourself up to speed with our introductory content
Spotlight article: Shon Harris explains the core concepts in the CISSP domain on software development security, including models, methods, database systems and security threats. Continue Reading
Spotlight article: Shon Harris explains the main concepts in the CISSP domain on telecommunications and networking, including network protocols, extension technologies and more. Continue Reading
Check Point Next Generation Firewall family combines firewalls with unified threat management technology, VPNs and more. Expert Mike O. Villegas takes a closer look. Continue Reading
Evaluate VPN Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The design of your applications could impact their performance in a multicloud environment. Avoid app performance challenges with these monitoring and management techniques. Continue Reading
Many longtime IT professionals are wondering if Microsoft's plan to release SQL Server on Linux means other products may be ported to the open source platform. Continue Reading
In a software-defined WAN showdown, network pro Will Murrell compares platforms from two top SD-WAN companies -- Cisco's Intelligent WAN and Viptela's Secure Extensible Network. Continue Reading
Learn to apply best practices and optimize your operations.
EFSS platforms are critical to enabling today's mobile workers. But to be truly successful, file-sharing apps must integrate with other apps to allow for document manipulation. Continue Reading
Typically a cloud workload doesn't stay in one spot. Expert Dave Shackleford discusses the best ways to secure traveling cloud workloads as they move across environments. Continue Reading
Consultant Bob Egan says that companies need to spend money on mobile cloud not just because it's beneficial to productivity but because it's required to keep up with competitors. Continue Reading
Problem Solve VPN Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Threat actors in China are using VPN services to hide and anonymize their attacks. Expert Nick Lewis explains how to get a handle on these VPN-enabled threats. Continue Reading
The threat of an evil twin attack has plagued enterprises for years, and it's still not leaving. Expert Nick Lewis explains how to defend against evil twins. Continue Reading
Industrial control systems should be securely managed by the enterprise, specifically when vendors need access to them. Here are some ways to handle industrial control systems security. Continue Reading