May 20, 2016
The most common data center operating system gets its final 6.x updates with the addition of a local backup archiving tool before transitioning to just security and stability updates.
April 22, 2016
Apple's enterprise security features draw praise from IT pros who say iOS data protection and encryption make the operating system a strong business platform.
March 02, 2016
Diffie, Hellman receive Turing Award and experts review cryptography research, Apple vs. FBI, Juniper backdoors, quantum crypto and the future of cryptography.
February 19, 2016
Securing AWS starts with knowing what mistakes to avoid. So, to get off on the right foot, learn from these cautionary tales of common AWS security blunders.
VPN Get Started
Bring yourself up to speed with our introductory content
SD-WAN architecture offers features that reduce operational costs and simplify deployment models. Learn how to take advantage of SD-WAN benefits and navigate its potential downfalls. Continue Reading
In this excerpt of Designing and Building Security Operations Center, author David Nathans reviews the infrastructure needed to support a SOC and maintain SOC security. Continue Reading
Gathering knowledge on IPv6 connectivity and implementation is critical to success in modern IP networking. Continue Reading
Evaluate VPN Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Many longtime IT professionals are wondering if Microsoft's plan to release SQL Server on Linux means other products may be ported to the open source platform. Continue Reading
In a software-defined WAN showdown, network pro Will Murrell compares platforms from two top SD-WAN companies -- Cisco's Intelligent WAN and Viptela's Secure Extensible Network. Continue Reading
OpenStack Neutron and VMware NSX provide a pluggable architecture to allow for seamless integration in the VMware infrastructure as well as the software-defined data center. Continue Reading
Learn to apply best practices and optimize your operations.
Typically a cloud workload doesn't stay in one spot. Expert Dave Shackleford discusses the best ways to secure traveling cloud workloads as they move across environments. Continue Reading
Consultant Bob Egan says that companies need to spend money on mobile cloud not just because it's beneficial to productivity but because it's required to keep up with competitors. Continue Reading
In this excerpt of Securing VoIP: Keeping your VoIP Network Safe, author Regis (Bud) Bates outlines different approaches to VoIP security and offers best practices to ensure infrastructure security is intact. Continue Reading
Problem Solve VPN Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Threat actors in China are using VPN services to hide and anonymize their attacks. Expert Nick Lewis explains how to get a handle on these VPN-enabled threats. Continue Reading
The threat of an evil twin attack has plagued enterprises for years, and it's still not leaving. Expert Nick Lewis explains how to defend against evil twins. Continue Reading
Industrial control systems should be securely managed by the enterprise, specifically when vendors need access to them. Here are some ways to handle industrial control systems security. Continue Reading