Network security strategy
-
News
26 Aug 2025
Three new Citrix NetScaler zero-days under active exploitation
Citrix patches three new vulnerabilities in its NetScaler lines warning of active zero-day exploitation by an undisclosed threat actor Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Aug 2025
Moscow exploiting seven-year-old Cisco flaw, says FBI
US authorities warn of an uptick in state-sponsored exploitation of a seven-year-old vulnerability in Cisco's operating system software Continue Reading
By- Alex Scroxton, Security Editor
-
Answer
28 Jun 2012
Securing big data: Architecture tips for building security in
Expert Matt Pascucci advises a reader on securing big data with tips for building security into enterprise big data architectures. Continue Reading
-
News
27 Jun 2012
Network security: Is new technology bypassing traditional controls?
Network security practices are among the most mature, but can businesses be sure network traffic is not sneaking past traditional controls? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Jun 2012
FTC sues Wyndham Worldwide hotel group over data breaches
The US Federal Trade Commission (FTC) is suing hotel group Wyndham Worldwide over claims it failed to secure customer data Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Jun 2012
Flame malware gets kill command
The controllers of Flame, the most powerful cyber weapon discovered to date, have recently sent a kill command that removes the malware from some infected computers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Jun 2012
Top 10 tips for IPv6 security
Many organisations are being misled about the complexities surrounding IPv6 security, according to security firm Stonesoft Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 May 2012
Security researchers discover powerful cyber espionage weapon 'Flame'
Security researchers have discovered a cyber espionage weapon, dubbed 'Flame', with a functionality greater than any other known threat Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 May 2012
Mobile threats demand focus on data protection, says Websense
Business needs to focus on data protection as cyber criminals turn to mobile malware, says Websense. Continue Reading
-
News
30 Apr 2012
Half of UK networks vulnerable to APTs
Many UK corporate networks are vulnerable to advanced persistent threats (APTs), a survey has revealed. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
24 Apr 2012
2012 Information Security Breaches Survey
Security breaches cost the UK billions over the last 12 months as cyber attacks reached record levels. Continue Reading
-
News
01 Mar 2012
RSA 2012: IT security experts urge enterprises to ban smartphone BYOD schemes
Enterprises should ban employees from using their own smartphones for work, a panel of IT security practitioners told the RSA Conference 2012 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Feb 2012
Does the PSN need to happen before the cloud?
The deployment of public services networks (PSN) will need to happen before widespread uptake of CloudStore services occur, IT heads said at a roundtable meeting. Continue Reading
By- Kathleen Hall, TechTarget
-
News
29 Dec 2011
Networking 2012: Vendors predict what's ahead for the industry
Senior vendor executives offer SearchNetworkingUK their Networking 2012 predictions for the challenges ahead, including addressing the transition to a mobile workforce. Continue Reading
By- Joe Fernandez, News Editor
-
News
13 Dec 2011
Network reliability to win over innovation in 2012, says Cisco survey
Cisco’s first TechWatch 2012 report finds network reliability as opposed to innovation or performance is the most important factor for network architects in the new year ahead. Continue Reading
By- Joe Fernandez, News Editor
-
Tutorial
14 Oct 2011
vSwitch best practices: Know what powers your virtualised network
Virtual switches in a virtualised network offer high agility, yet potential management and design issues as well. These vSwitch best practices explore those problems and solutions. Continue Reading
By- Rachel Shuster, TechTarget
-
News
22 Aug 2011
Unified network management: Wired and wireless together for good?
With an integrated network management vision, two organizations improved security and reliability, and have made steps towards a fully integrated network. But will we get there? Continue Reading
By- Lynn Haber, Contributor
-
News
17 Aug 2011
Cisco hardening guides for IOS, IOS-XR and NX-OS devices
Patching routing and switching infrastructure in any organisation is often delayed, sometimes due to the potential impact on production systems and sometimes because the IT resources are simply too busy fighting fires. Continue Reading
By- Stephen Gillies, editor
-
News
02 Jun 2011
Using network management and monitoring systems across IT and buildings
Bolton College linked its buildings facilities to the campus network and is using a network monitoring and management system that sees both buildings and IT resources. Continue Reading
By- Tracey Caldwell, Contributor
-
News
10 Mar 2011
Secure remote access enables virtual desktops, mobility
St. Richard’s Catholic College in East Sussex implemented secure remote access to allow mobile access to network resources while rolling out virtual desktop learning tools. Continue Reading
By- Tracey Caldwell