Articles about Network

From castles to cities -- a modern approach to authorization [Q&A]

Corporate information security has traditionally used the 'castle' approach, using a strong boundary to keep everything secure.

But as we've moved to hybrid working and more sharing of information the castle is too restrictive and we've moved towards a 'city' model, allowing open routes to trade with assets widely distributed.

Continue reading

Get 'Python for Security and Networking -- Third Edition' (worth $39.99) for FREE

Python’s latest updates add numerous libraries that can be used to perform critical security-related missions, including detecting vulnerabilities in web applications, taking care of attacks, and helping to build secure and robust networks that are resilient to them.

This fully updated third edition of Python for Security and Networking will show you how to make the most of them and improve your security posture.

Continue reading

Linksys launches Velop Pro 7 mesh Wi-Fi system for streaming and gaming

Today, Linksys launches its first Wi-Fi 7 Mesh System. Called "Velop Pro 7," it's all about making your home internet experience a breeze. Whether you're streaming movies, working from home, or gaming, this system has got you covered. And guess what? Setting it up is a piece of cake -- it takes less than 10 minutes!

Nowadays, every house has at least ten gadgets like phones, tablets, or smart TVs all connected to the internet. And with things like virtual reality (VR) and augmented reality (AR) becoming more common, having a strong internet connection is key. The Velop Pro 7 is Linksys’ newest and best system that helps you make the most out of these cool new technologies without any hassle.

Continue reading

Businesses struggle with IoT device connectivity

Wireless internet of things

A new report finds that IoT success is being jeopardized with just one percent of respondents achieving better than 98 percent connectivity levels on average across their devices.

The study, by connectivity solutions specialist Eseye, shows that only 16 percent of respondents are achieving more than 95 percent connectivity. Mission-critical IoT devices -- medical equipment for example -- require near-100 percent connectivity and the fact that companies are prepared to accept poor performance is concerning.

Continue reading

Remote work creates extra challenges for network teams

The ongoing shift to hybrid and remote work environments has resulted in key changes to the roles and priorities of network administrators in order to address new connectivity challenges and prioritize and preserve a secure, productive end-user experience.

New research by Enterprise Management Associates (EMA) and Auvik shows 73 percent of network professionals reported an increase in workloads, either slightly or significantly, following the shift from traditional to hybrid work environments.

Continue reading

Enterprise networks are evolving; your security architecture needs to evolve, too

Networked computers

The cybersecurity landscape is no stranger to change. Security strategies must adapt to the onslaught of new threats and the increasing sophistication of cyber-attacks. The emergence of 5G as a primary WAN technology creates new opportunities and corresponding security challenges for businesses. As 5G technology delivers faster and more flexible connectivity capabilities, enterprises can expand their networks and provide additional connectivity in more places and for a broader range of devices. With this comes a need for comprehensive, customizable security to handle this growth.   

A major area that 5G technology will affect is the expansion of IoT devices, as many will be added to 5G networks. Ericsson predicts the number of IoT-connected devices will reach 34.7 billion by 2028, up from 13.2 billion in 2022. As the number of IoT devices continues to grow, the attack surface also grows, increasing the risk of attack from bad actors. This is why we have seen a rise in cyber-attacks targeting IoT devices, with Techmonitor identifying a 98 percent spike in cyber-attacks on IoT devices within the last quarter of 2022.

Continue reading

What IT pros want from container security solutions

What capabilities do IT professionals need for container networking and security? That's what a new study from Tigera has set out to discover.

A survey of more than 1,200 users of the Calico Open Source container security platform finds the capabilities driving their adoption of Calico are, scalable networking (35 percent), security policies (35 percent), interoperability across different environments (33 percent) and encryption capabilities (30 percent).

Continue reading

Improving the end user experience on the new network

The rapid shift to a remote workforce has transformed how IT manages business networks. Today, attention is shifting beyond the monitoring of traditional infrastructure made up of physical network devices such as switches, access points, and firewalls. The newly expanded network includes everything that connects end users to the applications they need to do their jobs, including cloud hosting services, collaboration platforms, smartphones, and all the underlying networks end users are connecting through.

The remote and mobile workforce requires IT to manage the end user experience no matter where employees work, whether from the office, home, or some other location. This distributed workforce creates challenges to ensure that all employees can maintain strong online connectivity. As IT teams strive to manage the extended network, they find a clear correlation between employee connectivity and performance. That is why it is so crucial to measure the end user experience and understand how individuals engage with all the digital tools that enable them to be effective in their job roles.

Continue reading

Enterprises urged to prepare for major PKI changes

Certificate authority GlobalSign is warning that later this year, and into 2024, there will be significant changes within the Public Key Infrastructure (PKI) marketplace that they need to be aware of.

These changes involve several critical areas: Google's move to reduce the lifespan of SSL/TLS certificates to 90 days, new CA/Browser Forum Baseline Requirements for email security, and mandatory Root changes issued by Mozilla.

Continue reading

Firewalla Gold SE is set to offer protection for faster internet speeds

Towards the end of last year we reviewed the Firewalla Gold Plus, a more powerful version of the plug-in network protection device aimed at professional and business users.

Of course the world of the internet doesn't stand still for long and with gigabit speeds becoming more widely available as full fiber services are rolled out, Firewalla is set to up its game again with the launch of the Gold SE.

Continue reading

Threat intelligence is a priority but organizations lack network visibility

New research from asset visibility and security company Armis shows threat intelligence has become a top priority, yet organizations don't have a clear view of their networks.

The study of 400 IT professionals across the UK shows the top challenges they faced in the last six months as: keeping up with threat intelligence, compliance with cybersecurity regulations and frameworks, staffing and recruitment, an ever expanding attack surface, and visibility into all assets connected to the network.

Continue reading

Why automation can help continuously validate security policies [Q&A]

Security professionals all know that they should test their security hardware and software periodically to make sure it's working as intended. Many normal IT activities have unintended consequences that cause security configurations to 'drift' over time and make the organization more vulnerable.

But testing is frequently postponed or ignored because it never becomes a high enough priority. We spoke to Song Pang, SVP of engineering at NetBrain, to find out how automation can be used to detect when security products or network traffic are no longer behaving as intended.

Continue reading

Network edge technologies fail to cut it for modern businesses

Networked computers

New use cases are breaking existing edge technologies, such as MPLS and SD-WAN, according to a survey from Graphiant.

Enterprise connectivity has changed a lot in recent years, with a surge in remote workers, remote offices, and IoT. This has exposed shortcomings with MPLS and SD-WAN, with network architects rating both technologies with Ds and Fs for metrics such as scalability, agility, and cost.

Continue reading

Enterprises plan to increase cloud service investment as part of network transformation

Cloud money

In a drive for network transformation, 98 percent of enterprise IT leaders say they plan to increase their dependence and investment in cloud services.

The latest Enterprise Network Transformation report from SASE solutions company Aryaka finds that although an uncertain economy is impacting network and security team investments CIOs, CISOs and IT leaders are doubling down on investment in the cloud.

Continue reading

The future of networking: Innovation, transparency and connectivity

Future-network

As technology continues to evolve, the networking industry is experiencing significant changes that will have a profound impact on businesses worldwide. The key areas where we expect to see developments include innovation driven by the major cloud providers, accelerated connectivity, and the need for transparency into the network. 

These trends represent key factors that can enable businesses to drive innovation and competitiveness, even in the face of an increasingly challenging economic environment.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

Regional iGaming Content

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.