Networking

Networking | News, how-tos, features, reviews, and videos

secure system / network security policy management
Network World [slideshow] - Top 10 Supercomputers 2018 [slide-01]

802.11ax Wi-Fi routers: Aerohive AP650, ASUS Rapture GT-AX11000 and D-Link AX6000

How to secure your router and home network

Many users don't realize it, but their internet router is the most important electronic device in their home and is an attractive target for attackers.

keeping the cloud secure cloud security lock padlock private cloud

VMware amps security with in-house, Carbon Black technology

VMware's Carbon Black platform, along with VMware NSX, VMware Workspace ONE, VMware Secure State and future innovations, will deliver built-in security to networks, endpoints, workloads, identity\ies, cloud and analytics.

network security lock padlock breach

How IT pros deal with SD-WAN security concerns

When baseline SD-WAN security is not enough, enterprises are adopting extra measures such as intrusion prevention, anti-virus, unified threat management and more

youtube thumbnails template
video

What's next for 5G in the U.S.? | TECH(talk)

5G has been getting more and more buzz over the past few months, but very few people have actually experienced its promised high speeds. Customers in the U.S. are still months--if not years--away from widespread 5G coverage. PCWorld's...

tt19 040 state of 5g thumb 2560x1440
video

U.S. government voices concerns about China's involvement in 5G

As the global push toward 5G continues to pick up speed, government officials in the U.S. continue to have concerns about China's growing dominance in the 5G market. One U.S. senator, Sen. Mark Warner, has concerns about Chinese...

network security / network traffic scanning

3 leading network access control products reviewed

Real IT users evaluate network access control solutions: Cisco Identity Services Engine, Aruba ClearPass and ForeScout CounterACT. (Download the 27-page comparison.)

CSO  >  macOS Mojave endpoint security

Reviewing endpoint protection products (and picking the Top 10)

As you add more and more smartphones, laptops, tablets and other wireless devices that need to connect into your network remotely, how do you ensure you're secure? Download this report to evaluate the best options.

000.00 00 22 15.still002
video

What is IPv6?

IPv6 is the latest version of the main communications method that identifies and locates computers and other devices on the internet. It provides more efficient packet handling, improving performance and security. Yet despite this,...

tf19 043 thumb update
video

How tariffs on China affect tech buyers | TECH(feed)

The Trump administration levied tariff on many Chinese-made goods, including lots of tech hardware. Tech industry leaders have come out in opposition to the tariffs, which may result in higher prices. In this episode of TECH(feed),...

Cisco

Security shines at Cisco Live

Cisco's security team highlighted market results, integrated portfolio, and future plans, but there is still some work ahead.

tf19 034 thumb
video

Huawei ban may be delayed, but can the company survive without the U.S.? | TECH(feed)

First the Trump Administration banned business transactions between Huawei and U.S. companies. But now, the White House’s budget director has called for a two-year delay on the ban. If this ban does go into effect, how hard will...

tf19 032 thumb tf4
video

How the U.S. ban on Huawei is affecting business | TECH(feed)

The U.S. ban on Huawei business has already affected small telecom carriers in rural areas. And, unsurprisingly, Huawei responded to the ban with increased legal pressure. This fight is far from over, and Juliet has the latest updates...

thumb
video

Foldable phones and 5G: Highlights from Mobile World Congress 2019 | TECH(talk)

This year's MWC was mainly about 5G networking. And foldable phones. In fact, it was the foldables that stole the show, according to PC World's Michael Simon. He and Computerworld Executive Editor Ken Mingis chew over both topics in...

thumb
video

All about the Samsung Galaxy S10, MWC '19 and foldable phones | TECH(talk)

Samsung kicked off a busy week for mobile devices with the Samsung Galaxy S10 line-up, just ahead of this year's Mobile World Congress. That makes it a perfect time to talk about the S10, foldable phones and 5G networking.

networking background

Possible BGP hijacking takes Google down

Google went down Monday as a border gate protocol (BGP) issue rerouted traffic to China, Russia, and Nigeria.

nautilus shell

10 essential PowerShell security scripts for Windows administrators

PowerShell is a valuable tool for automating Windows administration tasks, including laborious security chores

network interface connections

Zeek: A free, powerful way to monitor networks, detect threats

Bro may have a new name -- Zeek -- but the platform has the same rich functionality for security professionals to help them analyze network data and detect threats.

connection network blockchain artificial intelligence ai

How to connect anything, anytime, anywhere with identity-based networking

Breaking down address-defined barriers to connectivity with Host Identity Protocol (HIP).

Load More