Network device security: Appliances, firewalls and switches News
August 31, 2020
Cisco discovered attempted exploitation of a high-severity vulnerability found in the IOS XR software used in some of its networking equipment.
June 16, 2020
Trend Micro's Zero Day Initiative published 10 vulnerabilities in Netgear's R6700 router that have gone unpatched for seven months.
April 27, 2020
Sophos released an emergency patch over the weekend for its XG firewalls after threat actors exploited a zero-day SQL vulnerability in the products to steal customer data.
January 17, 2020
Citrix discovered another product affected by last month's vulnerability, while security researchers found an attacker blocking exploits of the vulnerability.
Network device security: Appliances, firewalls and switches Get Started
Bring yourself up to speed with our introductory content
Firewall-as-a-service offerings implement security policies across consolidated traffic headed to all locations. Learn about four security features and benefits of FWaaS. Continue Reading
Examine the important differences between stateful and stateless firewalls, and learn when each type of firewall should be used in an enterprise setting. Continue Reading
In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, malicious. Continue Reading
Evaluate Network device security: Appliances, firewalls and switches Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Cybersecurity pros have been predicting the firewall's demise for years, yet the device is still with us. But does it have a place in zero-trust networks? One analyst says yes. Continue Reading
AI capabilities can identify and take down cyberthreats in real time but are only part of what your team needs to come out on the winning side of the cybersecurity battle. Continue Reading
In the era of cloud and COVID-19, analysts say ZTNA vendors offer a more secure remote access model than the legacy VPN. Here's how the technology works. Continue Reading
Manage Network device security: Appliances, firewalls and switches
Learn to apply best practices and optimize your operations.
A security operations center can help lessen the fallout of a data breach, but its business benefits go much further than that. Here are eight SOC benefits to consider. Continue Reading
Check out 10 tips to help build a next-generation security operations center with the integrated tools to free security analysts to get ahead of and respond to threats fast. Continue Reading
Learn how to present important cybersecurity metrics for the board to ensure that business leaders understand that money allocated to security is money well spent. Continue Reading
Problem Solve Network device security: Appliances, firewalls and switches Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Enterprises looking forward to deploying 5G must first assess their security concerns upfront and review their policies and procedures, despite 5G's security improvements. Continue Reading
Securing remote connections is critical, especially in a pandemic. Enact these RDP security best practices at your organization to prevent ransomware, brute-force attacks and more. Continue Reading
The worldwide health pandemic has created multiple challenges for today's CISOs and their security teams. Ask these three questions to stay safe in a post-pandemic workplace. Continue Reading