New & Notable
Network device security: Appliances, firewalls and switches News
June 16, 2021
Zscaler analyzed 1,500 networks and found administrators are leaving basic points of entry wide open for attackers as neglected servers are falling by the wayside.
February 09, 2021
The massive SolarWinds supply-chain attack continues to invade networks. Here's the latest news on the breach, how the malware infiltrates systems and the IT industry response.
August 31, 2020
Cisco discovered attempted exploitation of a high-severity vulnerability found in the IOS XR software used in some of its networking equipment.
June 16, 2020
Trend Micro's Zero Day Initiative published 10 vulnerabilities in Netgear's R6700 router that have gone unpatched for seven months.
Network device security: Appliances, firewalls and switches Get Started
Bring yourself up to speed with our introductory content
A virtual firewall is a firewall device or service that provides network traffic filtering and monitoring for virtual machines (VMs) in a virtualized environment. Continue Reading
A next-generation firewall (NGFW) is part of the third generation of firewall technology that can be implemented in hardware or software. Continue Reading
A digital certificate, also known as a public key certificate, is used to cryptographically link ownership of a public key with the entity that owns it. Continue Reading
Evaluate Network device security: Appliances, firewalls and switches Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
An IAM system introduces risks to the enterprise, but the consensus is the benefits of IAM outweigh the drawbacks. What are some of the issues that might arise? Continue Reading
Learn why former infosec instructor and author of 'How Cybersecurity Really Works' advocates for changes to security education and training to alleviate the industry skills gap. Continue Reading
Customer confusion in the security market stems from the number of new products designed to deal with a growing number of cyberthreats. Experts look at how to navigate it all. Continue Reading
Manage Network device security: Appliances, firewalls and switches
Learn to apply best practices and optimize your operations.
A security operations center can help lessen the fallout of a data breach, but its business benefits go much further than that. Here are eight SOC benefits to consider. Continue Reading
Check out 10 tips to help build a next-generation security operations center with the integrated tools to free security analysts to get ahead of and respond to threats fast. Continue Reading
Learn how to present important cybersecurity metrics for the board to ensure that business leaders understand that money allocated to security is money well spent. Continue Reading
Problem Solve Network device security: Appliances, firewalls and switches Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Keeping TCP port 445 and other SMB ports open is necessary for resource sharing, yet this can create an easy target for attackers without the proper protections in place. Continue Reading
Risk management programs yield massive data on network security vulnerabilities. Infosec pros must rank risks to prioritize remediation efforts. Continue Reading
By performing ongoing risk assessments, organizations can keep their SSH vulnerabilities at a minimum and ensure their remote access foundation is secure. Continue Reading