IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

network security

Successful WAN and security transformation powers the digital enterprise
Dark grey whitepaper cover with white title and circular graphics in pink stripes and a lighter greywhitepaper
Whitepaper

Successful WAN and security transformation powers the digital enterprise

Applications are delivered in the cloud - security should be too
8 Mar 2022
Edge to cloud security: A new WAN and security edge
Orange whitepaper cover with image of someone at a laptop on a video conference call with other people smiling backwhitepaper
Whitepaper

Edge to cloud security: A new WAN and security edge

A practical guide to adopting a secure access service edge (SASE) architecture
8 Mar 2022
Introducing the zero trust edge model for security and network services
Whitepaper cover with black block across the top and yellow, green and black pipe graphics with title and copywhitepaper
Whitepaper

Introducing the zero trust edge model for security and network services

Get a better understanding of emerging zero trust solutions
8 Mar 2022
The state of SD-WAN, SASE and zero trust security architectures
Whitepaper cover with graphic of a man stood on a laptop in front of a padlock, in front of a cloud with a server in the cloud, plus other peoplewhitepaper
Whitepaper

The state of SD-WAN, SASE and zero trust security architectures

Be a leader in the deployment of zero trust, SD-WAN and SASE
8 Mar 2022
Cisco patches bug that could break its email security service with a single message
A Cisco sign on a street corner next to a red traffic light
cyber security

Cisco patches bug that could break its email security service with a single message

A carefully crafted email could freeze Cisco's Email Security Appliance interface and stop it processing messages
17 Feb 2022
Remote access to businesses sold for huge profit in growing dark web operation
A digital padlock representing security
cyber security

Remote access to businesses sold for huge profit in growing dark web operation

Researchers told IT Pro the lucrative business model is reaching 'full maturity' but has opportunities to become even more profitable in the near futu…
16 Feb 2022
Juniper acquires cloud networking startup WiteSand
Juniper Networks sign on a building
Acquisition

Juniper acquires cloud networking startup WiteSand

The deal will enable Juniper to advance traditional NAC solutions using AI and the cloud
15 Feb 2022
Building IT antibodies to fight future shocks
A computer generated image of a syringe with a mouse pointer hovering over it
IT infrastructure

Building IT antibodies to fight future shocks

As enterprises look towards their post-COVID futures, they must ensure their IT systems are robust, secure, and resilient
9 Feb 2022
Cloudflare opens $3,000 bug bounty program to the public
Data
bugs

Cloudflare opens $3,000 bug bounty program to the public

The company's previous program paid out around $212,000 over its lifetime
3 Feb 2022
CISA warns organizations to isolate Ukranian traffic
A zoomed in photo of a world map showing Ukraine
cyber security

CISA warns organizations to isolate Ukranian traffic

Security agency tells IT staff to be on alert following cyber attacks on Ukraine
20 Jan 2022
The UK's IoT proposals are riddled with ‘astonishing’ gaps
Image of small robots connected to represent a botnet
Internet of Things (IoT)

The UK's IoT proposals are riddled with ‘astonishing’ gaps

The Product Security and Telecommunications Infrastructure (PTSI) Bill aims to address the connected devices security nightmare, but experts agree it …
19 Jan 2022
Ransomware: Why only the bravest businesses will survive
A chained lock situated on a laptop displaying a red screen
ransomware

Ransomware: Why only the bravest businesses will survive

With ransomware attacks a matter of when, not if, the secret to protecting your reputation lies in honesty and transparency
17 Jan 2022
HornetSecurity 365 Total Protection review: Keeping email squeaky clean
HornetSecurity 365 Total Protection screenshot
Security

HornetSecurity 365 Total Protection review: Keeping email squeaky clean

Tough email protection for Microsoft 365 that’s simple to deploy, easy to manage and very affordable
10 Dec 2021
What is network forensics?
A magnifying glass searching code for fingerprints
cyber attacks

What is network forensics?

Taking a closer look at how cyber threats are investigated at a network level
7 Dec 2021
Planned Parenthood cyber attack exposes data of 400,000 patients
A view of the outside of a Planned Parenthood facility in Washington, DC
cyber attacks

Planned Parenthood cyber attack exposes data of 400,000 patients

Patients have been advised to check their health insurance statements for fraudulent activity
3 Dec 2021
Container network security guide for dummies
For Dummies style cover with whitepaper title at the topwhitepaper
Whitepaper

Container network security guide for dummies

Enforcing Kubernetes best practices
3 Dec 2021
IDC: The business value of VMware NSX Advanced Load Balancer
Whitepaper first page with title and textwhitepaper
Whitepaper

IDC: The business value of VMware NSX Advanced Load Balancer

A study of enterprises using next-generation application delivery
3 Dec 2021
What is single sign-on (SSO)?
A close-up shot of a login portal
single sign-on (SSO)

What is single sign-on (SSO)?

We explain how SSO works and why you need it
2 Dec 2021
Your journey to zero trust
Image of speaker Dave Gruber in black and white with associated company logos along bottomwhitepaper
Whitepaper

Your journey to zero trust

What you wish you knew before you started
2 Dec 2021
Identity's role in zero trust
Title of the webinar on a blue background with an 'O' patternwhitepaper
Whitepaper

Identity's role in zero trust

Zero trust starts with a change in philosophy
2 Dec 2021
Gatekeeping the internet: Is UK net neutrality under threat?
Graphic with abstract lines to represent the internet
Network & Internet

Gatekeeping the internet: Is UK net neutrality under threat?

As Ofcom reviews the UK's net neutrality regulations, we explore whether the web is a level playing field for all businesses
26 Nov 2021
Thousands of printers at risk of denial of service attacks
An abstract mock up of a blue padlock on a binary code background
cyber security

Thousands of printers at risk of denial of service attacks

Attackers can easily manipulate the 9100 port to hijack hardware and steal data, researchers claim
25 Nov 2021
Vast majority of US healthcare web apps vulnerable to attack
A heartbeat monitor displayed inside an operating room
network security

Vast majority of US healthcare web apps vulnerable to attack

Report suggests patient data is at risk from poor security hygiene
24 Nov 2021
US government warns of increased risk of ransomware over holiday season
Holiday season warning
ransomware

US government warns of increased risk of ransomware over holiday season

CISA and FBI issue joint statement warning organizations not to let their guard down
24 Nov 2021