August 23, 2016
A Cisco security vulnerability affecting routers was found in the Shadow Brokers cyberweapon dump, and it may have been used by the NSA for years to decrypt VPN traffic.
May 20, 2016
The most common data center operating system gets its final 6.x updates with the addition of a local backup archiving tool before transitioning to just security and stability updates.
April 22, 2016
Apple's enterprise security features draw praise from IT pros who say iOS data protection and encryption make the operating system a strong business platform.
March 02, 2016
Diffie, Hellman receive Turing Award and experts review cryptography research, Apple vs. FBI, Juniper backdoors, quantum crypto and the future of cryptography.
VPN Get Started
Bring yourself up to speed with our introductory content
Administrators can install an open source virtual software router to practice networking skills, such as IP routing and subnetting. Continue Reading
Spotlight article: Shon Harris explains the core concepts in the CISSP domain on software development security, including models, methods, database systems and security threats. Continue Reading
Spotlight article: Shon Harris explains the main concepts in the CISSP domain on telecommunications and networking, including network protocols, extension technologies and more. Continue Reading
Evaluate VPN Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Amazon VPC is an essential piece of the hybrid cloud puzzle, enabling enterprises to control public cloud configurations while securely connecting to private data centers. Continue Reading
The design of your applications could impact their performance in a multicloud environment. Avoid app performance challenges with these monitoring and management techniques. Continue Reading
Many longtime IT professionals are wondering if Microsoft's plan to release SQL Server on Linux means other products may be ported to the open source platform. Continue Reading
Learn to apply best practices and optimize your operations.
EFSS platforms are critical to enabling today's mobile workers. But to be truly successful, file-sharing apps must integrate with other apps to allow for document manipulation. Continue Reading
Typically a cloud workload doesn't stay in one spot. Expert Dave Shackleford discusses the best ways to secure traveling cloud workloads as they move across environments. Continue Reading
Consultant Bob Egan says that companies need to spend money on mobile cloud not just because it's beneficial to productivity but because it's required to keep up with competitors. Continue Reading
Problem Solve VPN Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Threat actors in China are using VPN services to hide and anonymize their attacks. Expert Nick Lewis explains how to get a handle on these VPN-enabled threats. Continue Reading
The threat of an evil twin attack has plagued enterprises for years, and it's still not leaving. Expert Nick Lewis explains how to defend against evil twins. Continue Reading
Industrial control systems should be securely managed by the enterprise, specifically when vendors need access to them. Here are some ways to handle industrial control systems security. Continue Reading