Network Security
Discover expert analysis on network security with news, features and insights from the team at IT Pro.
-
Dragos’ new partner program aims to turn resellers into OT expertsNews The initiative will help partners fully manage customer deployments with Dragos’ ISC/OT security offerings
By Daniel Todd Published
News -
How to build your resilience against application layer threatsWhitepaper Addressing security threats with a consolidated cloud-based platform approach
By ITPro Published
Whitepaper -
How to secure employees, applications and networksWhitepaper Everywhere security
By ITPro Published
Whitepaper -
The top zero trust use casesWhitepaper The challenges organizations solve to reduce risk and cost
By ITPro Published
Whitepaper -
The power of the One True Zero Trust PlatformWhitepaper Delivering unparalleled security and superior economic value
By ITPro Published
Whitepaper -
Barracuda Networks says hacked devices “must be immediately replaced” despite patchesNews Seven-month exploitation of a critical vulnerability enabled persistent backdoor access in its email security gateway devices
By Ross Kelly Published
News -
Warning issued over ‘widespread’ exploitation of Zyxel NAS devicesNews Zyxel has been forced to issue patches for several vulnerabilities affecting NAS devices
By Ross Kelly Published
News -
Barracuda network appliance vulnerability “actively exploited” for seven monthsNews The company has issued a patch, but warned customers that the vulnerability left them exposed for over half a year
By Ross Kelly Published
News -
ASUS, Cisco, Netgear devices exploited in ongoing Chinese hacking campaignNews Critical national infrastructure is the target of sustained attempts from state-sponsored hackers, according to Five Eyes advisories
By Ross Kelly Published
News -
How applications are attackedwhitepaper A year in application security
By ITPro Published
whitepaper -
Journey to SASEwhitepaper Modernize connectivity to drive business agility
By ITPro Published
whitepaper -
How to mitigate identity-based attacksIn-depth If identity-based cyber attacks are successful, they can give hackers the opportunity to infiltrate an entire network
By Sandra Vogel Published
In-depth