Upcoming Events

A Network Computing Webcast:
SSDs and New Storage Options in the Data Center

March 13, 2013
11:00 AM PT / 2:00 PM ET

Solid state is showing up at every level of the storage stack -- as a memory cache, an auxiliary storage tier for hot data that's automatically shuttled between flash and mechanical disk, even as dedicated primary storage, so-called Tier 0. But if funds are limited, where should you use solid state to get the best bang for the buck? In this Network Computing webcast, we'll discuss various deployment options.

Register Now!


Interop Las Vegas 2013
May 6-10, 2013
Mandalay Bay Conference Center
Las Vegas

Attend Interop Las Vegas 2013 and get access to 125+ workshops and conference classes, 350+ exhibiting companies and the latest tech.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

WAN Security Channel

Blogs

user-pic

Hacking Everything

September 01, 2011 08:58 AM
Posted by Lee H. Badman

Here’s a puzzle for you: What do a new Dodge Ram pickup truck, a digital road sign, a young English lady’s cell phone and a modern lighting control system have in common? They’re not all necessarily made in the same Third World country, if that’s what you’re thinking. But they are all exploitable by virtue of their network connectivity, and the implications can be quite worrisome.

See all blogs by Lee H. Badman

| Full Post

Tags: security, hacking, intrusion prevention

Channel: Security, WAN Security, Wireless

user-pic

Black Hat Will Once Again Show Our Security Weaknesses

August 01, 2011 11:15 AM
Posted by Jim Rapoza

The most important thing about Black Hat is the reality check it provides on just how insecure everything really is, from computers to networks to mobile devices to industrial and other systems that are now increasingly connected and exposed. And this week’s Black Hat will be no exception, as several scheduled demos will display just how scary some of these security holes can be.

See all blogs by Jim Rapoza

| Full Post

Tags: Black Hat, security, data breaches

Channel: Security, WAN Security, Data Protection

user-pic

Don't Get Snagged By Spear Phishers

July 12, 2011 07:00 AM
Posted by Jim Rapoza

For one growing security concern, basic security systems and good user awareness may not be enough to keep users and businesses protected. In some of the recent cases of spear phishing, even trained security personnel were tricked into surrendering personal data or infecting systems with malware.

See all blogs by Jim Rapoza

| Full Post

Tags: security, spear phishing, malware

Channel: Security, WAN Security, Data Protection

user-pic

No Data Privacy In The Cloud

July 01, 2011 11:08 AM
Posted by Jim Rapoza

Most people understand that data in the cloud won’t have the same level of security and privacy that data inside your corporate firewall has. But some recent news has shown just how insecure your cloud-based data really is.

See all blogs by Jim Rapoza

| Full Post

Tags: privacy, cloud computing, security

Channel: WAN Security, Security, Data Protection, Cloud Computing

user-pic

Enterprise Social Networks And Security Risks

June 28, 2011 07:00 AM
Posted by Jim Rapoza

While attending UBM TechWeb's Enterprise 2.0 Conference in Boston last week, I heard lots of conversations about the benefits and potential pitfalls of enterprise social networking. One theme that I heard repeated more than a few times was that enterprise social networks can create a greater security risk.

See all blogs by Jim Rapoza

| Full Post

Tags: security, enterprise social networking, enterprise 2.0

Channel: Security, WAN Security, UC & VoIP

user-pic

Securing What You Don't Own

June 21, 2011 07:00 AM
Posted by Jim Rapoza

What do you do when the laptops, smartphones and tablets accessing company resources are owned by employees? You may find that traditional methods of security and management will be much harder to implement.

See all blogs by Jim Rapoza

| Full Post

Tags: security, mobile device management, consumerization of IT,

Channel: Security, WAN Security, Wireless

<< Previous

Next >>


Best of the Web

VXLAN termination on physical devices

VXLAN is an Experimental IETF draft of protocols to enable the creation of a large overlay, multi-tenant network.

Quick Read

ONF Deadly Serious About OpenFlow-Based SDNs

: OpenFlow is poised to reach over-hyped status, yet there are practical, useful reasons for keeping an eye on Openflow. The biggest cloud players are involved and driving the feature creation.

Quick Read

Practical Introduction to Applied OpenFlow

Get a primer on the Openflow protocol and what it can do for networking.

Quick Read

On Resilience of Spit-Architecture Networks

This research papers investigates the practical issues in split-architecture networks and the placement of the controllers, such as Openflow controllers, in the network.

Quick Read

IaaS Providers
Cloud Computing Comparison
With 17 top vendors and features matrixes covering more than 60 decision points, this is your one-stop shop for an IaaS shortlist.
IaaS Providers

WAN Security Reports

Research and Reports

The Virtual Network
February 2013

Network Computing: February 2013

Upcoming Events



TechWeb Careers