IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

network security

WatchGuard finds malware volume decreased in Q2, but warns Emotet is resurging
Image of a cyber criminal using several computers in a dark room
malware

WatchGuard finds malware volume decreased in Q2, but warns Emotet is resurging

The network security company underlined that Microsoft Office exploits continue to spread more than any other category of malware too
28 Sep 2022
DrayTek Vigor 2866ax review: Faster than you might expect
A photograph of the DrayTek Vigor 2866ax
routers

DrayTek Vigor 2866ax review: Faster than you might expect

A versatile and very affordable SMB security router with Wi-Fi 6 and top-notch WAN redundancy
7 Sep 2022
Gov to force through tough telecoms regulations to boost network security
network traffic
network security

Gov to force through tough telecoms regulations to boost network security

Regulator Ofcom will have powers to monitor, investigate and fine providers that fail to meet the new requirements
30 Aug 2022
NEC and Fortinet partner to deliver high-performance security for 5G networks
Fortinet sign on a grey building
5G

NEC and Fortinet partner to deliver high-performance security for 5G networks

The carrier solution will ensure end-to-end security while CSPs contend with increased traffic
23 Aug 2022
Over 200,000 DrayTek routers vulnerable to total device takeover
A digital render of a blue padlock fragmenting into a cloud of data
Security

Over 200,000 DrayTek routers vulnerable to total device takeover

The routers are popular with small and medium businesses, but are easily exploitable by threat actors seeking to steal data or launch ransomware
3 Aug 2022
HTTP vs HTTPS: What difference does it make to security?
A close up of a browser window, showing the HTTPS protocol of a website in the URL bar
Network & Internet

HTTP vs HTTPS: What difference does it make to security?

We look at the difference between HTTPS and HTTP and tell you how to switch between them
20 Jul 2022
What is zero trust?
Key lit up on a dark background of 1s and 0s
network security

What is zero trust?

How a zero trust security strategy better protects your business from internal and external attackers
14 Jul 2022
Cloudflare unveils new One Partner Program with zero trust at its core
A close up photo of Matthew Prince, CEO and co-founder of Cloudflare, speaking on a stage
channel

Cloudflare unveils new One Partner Program with zero trust at its core

Cloudflare CEO Matthew Prince says the initiative aims to take the complexity out of zero trust architecture
24 Jun 2022
Network detection and response market to hit $5.3bn by 2028
Finger pointing towards malware on a piece of code
network security

Network detection and response market to hit $5.3bn by 2028

North America is estimated to hold the largest market share over the forecast period
8 Jun 2022
What is SSID?
wireless router
broadband

What is SSID?

We look at what SSID is and how it is used to connect devices to the internet
7 Jun 2022
Five Eyes leaders issue guidance for MSPs to prevent second SolarWinds attack
A group of hackers behind the Russian flag
Security

Five Eyes leaders issue guidance for MSPs to prevent second SolarWinds attack

The joint advisory published today said MSPs and customers need more vigilant in the wake of Russia's invasion of Ukraine
11 May 2022
Vector Capital acquires majority ownership of WatchGuard
An image of a digital padlock
Security

Vector Capital acquires majority ownership of WatchGuard

Global private equity firm gobbles up shares from co-investors as it doubles down on its commitment to the cyber security platform provider
29 Apr 2022
Top online cyber security courses for 2022
A close up shot of someone pressing a keyboard key on a laptop covered in blue and red lighting
Careers & training

Top online cyber security courses for 2022

Our top picks from the plethora of cyber security courses available, including a mix of free and paid, and those aimed at experts and beginners
5 Apr 2022
Auvik Network Management review: A breeze to deploy
Auvik Network Management screenshot
Network & Internet

Auvik Network Management review: A breeze to deploy

Auvik’s cloud-hosted monitoring is quick to provide a complete picture of your network
1 Apr 2022
New MFA security standards for online payments come into force
Man holding credit card making online payment on a tablet
two-factor authentication (2FA)

New MFA security standards for online payments come into force

Version 4.0 of PCI DSS also reforms password requirements and broadens its terminology to address other network access controls
31 Mar 2022
Vodafone and Ericsson complete UK's first 5G network slicing trial
Top view of people walking in different directions of pattern, painted on asphalt as visual representation of network slicing
5G

Vodafone and Ericsson complete UK's first 5G network slicing trial

Network slicing allows businesses and app developers to carve out a ‘slice’ of the network suited to specific use cases
15 Mar 2022
What is Strong Customer Authentication (SCA) under PSD2?
Online payment
two-factor authentication (2FA)

What is Strong Customer Authentication (SCA) under PSD2?

An in-depth look at the EU directive that aims to harmonise online payment protection
14 Mar 2022
Edge-to-cloud security webinar
Dark blue webinar screen with orange and light blue circular graphicswhitepaper
Whitepaper

Edge-to-cloud security webinar

Safeguards your IoT devices that require Zero Trust
8 Mar 2022
Successful WAN and security transformation powers the digital enterprise
Dark grey whitepaper cover with white title and circular graphics in pink stripes and a lighter greywhitepaper
Whitepaper

Successful WAN and security transformation powers the digital enterprise

Applications are delivered in the cloud - security should be too
8 Mar 2022
Edge to cloud security: A new WAN and security edge
Orange whitepaper cover with image of someone at a laptop on a video conference call with other people smiling backwhitepaper
Whitepaper

Edge to cloud security: A new WAN and security edge

A practical guide to adopting a secure access service edge (SASE) architecture
8 Mar 2022
Introducing the zero trust edge model for security and network services
Whitepaper cover with black block across the top and yellow, green and black pipe graphics with title and copywhitepaper
Whitepaper

Introducing the zero trust edge model for security and network services

Get a better understanding of emerging zero trust solutions
8 Mar 2022
The state of SD-WAN, SASE and zero trust security architectures
Whitepaper cover with graphic of a man stood on a laptop in front of a padlock, in front of a cloud with a server in the cloud, plus other peoplewhitepaper
Whitepaper

The state of SD-WAN, SASE and zero trust security architectures

Be a leader in the deployment of zero trust, SD-WAN and SASE
8 Mar 2022
Cisco patches bug that could break its email security service with a single message
A Cisco sign on a street corner next to a red traffic light
cyber security

Cisco patches bug that could break its email security service with a single message

A carefully crafted email could freeze Cisco's Email Security Appliance interface and stop it processing messages
17 Feb 2022