WAN Security Channel
News and Analysis
Stuxnet, The Prequel: Earlier Version Of Cyberweapon Discovered
Symantec finds 'missing link' in infamous Stuxnet malware that sabotages another piece of equipment in Iranian nuclear facility--attackers became more aggressive as campaign ensued
More News and Analysis
- McAfee Launches Real-Time Security Policy Software
- Cloud Security Measures Too Opaque For Customers
- More Data On Attackers, But Attribution Still Dodgy
- News Roundup: UC, Storage and Security
More News and Analysis in WAN Security Channel »
Reviews & Workshops
Mobile Biometrics: The Next Phase of Enterprise Authentication?
Smartphones and tablets equipped with fingerprint readers or other biometric hardware have the potential to drive greater adoption of biometric authentication in the enterprise—if we can get the hardware, software and business processes right.
More Reviews & Workshops
Blogs
Readers Respond: F5 Firewall Challenges Cisco, Check Point
February 06, 2013 05:38 PM
Posted by Andrew Conry Murray
Network Computing readers weighed in on F5’s entry into the firewall market and how its strategy of integrating firewall software into its load-balancing platform might play out with customers and competitors.
See all blogs by Andrew Conry Murray
Toward More Reliable Wireless With AirMagnet Enterprise 10
February 27, 2012 04:40 PM
Posted by Lee H. Badman
If the phone isn't ringing, then your wireless users must not be feeling any pain, right? That can be a dangerous assumption in large, complicated wireless networks. Some issues may not be crystallized enough to raise your clients' ire, but the fact remains that performance is degraded. AirMagnet's latest Enterprise version wants to make hard-to-find problems more obvious even as the WLAN gets ever more complex.
See all blogs by Lee H. Badman
Riverbed's Granite Virtualizes Branch Office Storage
February 10, 2012 09:00 AM
Posted by Howard Marks
When Riverbed and others brought WAN acceleration to the market around the turn of the century, many of us hoped that with WAN acceleration we could pull the servers, and the headaches they cause, from branch offices. Unfortunately, many organizations found reasons to keep servers in the branches. Riverbed's new Granite appliance allows organizations to keep servers in their branch offices while eliminating many of the headaches through what Riverbed's calling Edge Virtual Server Infrastructure.
See all blogs by Howard Marks
Red Lambda: Security Revolution Or Just Evolution?
November 14, 2011 07:00 AM
Posted by David Hill
Security statistics are depressing. The bad guys seem to be overwhelming the good guys, even when the good guys are well-known security vendors. So when an emerging company, such as Red Lambda, claims to have software that significantly improves the odds for the good guys, you need to pay close attention.
See all blogs by David Hill
Certificate Authority Compromises Are Global In Reach
September 09, 2011 01:48 PM
Posted by Mike Fratto
There has already been a lot written about the compromise at DigiNotar, GlobalSign and Comodo. One day we will look at the summer of 2011 as the time when the PKI collapsed. That's not hyperbole. The problems with certificate authorities and the inherent weakness they present have been known for years--a fact we alluded to as far back as 1997. Browsers accept certificates as trusted in that they have the signing CA certificate in their local browser store. Browsers do not check that a particular CA is authorized to actually issue a particular server certificate. The trust is universal. That is why the attacks on DigiNotar, GlobalSign and Comodo are so serious and have global impact.
See all blogs by Mike Fratto
Certificate Authority Hack Points To Bigger Problems
September 07, 2011 07:00 AM
Posted by Jim Rapoza
What with hurricanes, earthquakes and Kardashian weddings dominating recent media coverage, you may have missed the news about a recent security breach that clearly displayed a serious weakness in one of the core security mechanisms of the Internet.
See all blogs by Jim Rapoza
Best of the Web
VXLAN termination on physical devices
VXLAN is an Experimental IETF draft of protocols to enable the creation of a large overlay, multi-tenant network.
ONF Deadly Serious About OpenFlow-Based SDNs
: OpenFlow is poised to reach over-hyped status, yet there are practical, useful reasons for keeping an eye on Openflow. The biggest cloud players are involved and driving the feature creation.
Practical Introduction to Applied OpenFlow
Get a primer on the Openflow protocol and what it can do for networking.
On Resilience of Spit-Architecture Networks
This research papers investigates the practical issues in split-architecture networks and the placement of the controllers, such as Openflow controllers, in the network.












