Latest from todayfeatureWhat is SASE? A cloud service that marries SD-WAN with securitySecure access service edge is a Gartner model for streamlining network access, improving security, boosting network performance and reducing the number of vendors and devices IT pros have to deal with.By Jeff VanceFeb 13, 202513 minsData CenterSASESD-WAN news Cisco’s ISE bugs could allow root-level command executionBy Shweta SharmaFeb 07, 20251 minSecurityVulnerabilitiesnews Fortinet targets branch offices with upgraded firewallsBy Michael CooneyFeb 06, 20252 minsFirewallsNetwork SecurityRemote Access Security how-toDownload the extended detection and response (XDR) buyer’s guideBy Tim Ferrill Feb 05, 20251 minEnterprise Buyer’s GuidesIntrusion Detection SoftwareNetwork Security newsAMD patches microcode security holes after accidental early disclosureBy Evan Schuman Feb 03, 20255 minsCPUs and ProcessorsSecurity newsWhat is Transport Layer Security? How TLS1.3 protects your dataBy Zeus Kerravala Jan 31, 20255 minsData CenterNetworkingSecurity newsAMD’s unpatched chip microcode glitch may require extreme measures by CISOsBy Evan Schuman Jan 23, 20251 minCPUs and ProcessorsSecurity brandpostSponsored by IDCAI at Work: How SOS 102 is Building Safer Communities in KazakhstanBy IDC Jan 23, 20254 minsSecurity brandpostSponsored by ZscalerA CSO's perspective: 8 cyber predictions for 2025By Zscaler Jan 14, 202510 minsSecurity ArticlesnewsCompTIA bolsters security penetration testing certificationCompTIA PenTest+ certification provides professionals with intermediate-level cybersecurity know-how to better secure environments.By Denise Dubie Jan 09, 2025 4 minsCertificationsIT JobsSecuritybrandpostSponsored by Zscaler2025 ransomware predictions, trends, and how to prepareThe future of cybersecurity lies in fighting AI-powered ransomware with smarter defenses…are you prepared?By Zscaler Jan 06, 2025 3 minsRansomwareSecurityZero TrustnewsMore telecom firms were breached by Chinese hackers than previously reportedSalt Typhoon’s latest victims include Charter, Consolidated, and Windstream, underscoring the widening scope of China’s cyberespionage campaign against critical US infrastructure.By Gyana Swain Jan 06, 2025 1 minData BreachSecurityTelecommunications Industryanalysis5 network automation startups to watchAutomating network processes can head off issues and speed resolution of problems while cutting the workload of IT pros.By Jeff Vance Dec 23, 2024 10 minsNetwork Management SoftwareNetworkingSecuritybrandpostSponsored by ZscalerThreats delivered over encrypted channels continue to riseAnalysis highlights cyberattack trends, top threat categories, most common attack targets, and other insights.By Zscaler Dec 20, 2024 7 minsSecuritynewsUS moves to tighten restrictions on China Telecom amid security fearsLast week, the government issued a preliminary ruling deeming China Telecom Americas’ US network and cloud operations a national security risk.By Prasanth Aby Thomas Dec 17, 2024 4 minsCloud ComputingTechnology IndustryTelecommunicationsnewsAMD data center chips vulnerable to revealing data through ‘BadRAM’ attackResearchers find a way to access encrypted data in AMD EPYC data center chips using rogue memory modules.By John E. Dunn Dec 12, 2024 1 minCPUs and ProcessorsSecuritybrandpostSponsored by ZscalerSecure shadow data in the cloud with new innovations on Zscaler DSPMSecuring sensitive data in the cloud era: How Zscaler DSPM leads the way…and creates peace of mind. By Moinul Khan Dec 04, 2024 4 minsCloud ComputingSecurityhow-toDownload the Cloud Optimization Enterprise SpotlightFrom our editors: We look at how IT leaders are reworking their cloud implementations for better fit to their needs, as well as how they can control cloud costs and ensure cloud security.By CIO staff Dec 02, 2024 1 minCloud ComputingCloud ManagementCloud SecuritynewsCISOs who delayed patching Palo Alto Vulnerabilities now face real threat CISA said it has evidence of active exploitation for two out of six Expedition vulnerabilities Palo Alto Networks patched in October.By Shweta Sharma Nov 15, 2024 1 minFirewallsSecurityVulnerabilitiesbrandpostSponsored by ZscalerEliminating Lateral Threat Movement INSIDE factory, branch, and campus networksEnhancing network security: Zscaler's Zero Trust Device Segmentation for protecting against lateral attacks—learn more today.By Zscaler Nov 06, 2024 9 minsNetworkingSecurityhow-toBuyer’s guide: Data protection for hybrid cloudsTo safeguard enterprise data in hybrid cloud environments, organizations need to apply basic data security techniques such as encryption, data-loss prevention (DLP), secure web gateways (SWGs), and cloud-access security brokers (CASBs). But such security is just the start; they also need data protection beyond security. By Neal Weinberg Nov 04, 2024 13 minsCloud ManagementData and Information SecurityHybrid Cloud Show more Show less View all Upcoming Events12/Mar in-person event FutureIT Los AngelesMar 12, 2025The Biltmore Technology Industry 04/May-06/May in-person eventWork+ – The New Future of Work: AI, Emerging Tech & Where IT Can LeadMay 04, 2025Loews Vanderbilt Hotel Nashville Artificial Intelligence 25/Jun in-person event FutureIT DallasJun 25, 2025Union Station Events View all events Resources whitepaper Frictionless Security in Financial Services: How Top Brands Prevent Fraud Without Compromising CX Financial services companies, such as banks, credit unions, investment apps, and money transfer services are prime targets for fraud. The post Frictionless Security in Financial Services: How Top Brands Prevent Fraud Without Compromising CX appeared first on Whitepaper Repository –. By Twilio 12 Feb 2025Data and Information SecurityFinancial Services IndustrySecurity whitepaper Turn compliance into resilience: A new approach to security and readiness By Commvault 11 Feb 2025Business OperationsIT OperationsSecurity whitepaper Delivering ROI on AI: How Al transforms customer support efficiency By Elasticsearch, Inc. | Microsoft 07 Feb 2025Artificial IntelligenceBusiness OperationsSecurity View all Video on demand videoHow to prepare Office 365 and Windows for a disasterWith IT and security teams stressed due to the COVID-19 crisis, it’s more important than ever to make sure you’ve prepared your network for a disaster. Apr 01, 2020 6 minsSecurity See all videos Explore a topic 5G Careers Cloud Computing CPUs and Processors Data Center Edge Computing Enterprise Storage Generative AI Industry Internet of Things Linux Networking Network Management Software Virtualization Show me morePopularArticlesPodcastsVideos news Palo Alto Networks firewall bug being exploited by threat actors: Report By Howard Solomon Feb 14, 20253 mins FirewallsVulnerabilitiesZero-day vulnerability opinion Nvidia forges healthcare partnerships to advance AI-driven genomics, drug discovery By Zeus Kerravala Feb 14, 20256 mins Networking news Juniper CEO: 'I am disappointed and somewhat puzzled' by DOJ merger rejection By Michael Cooney Feb 14, 20258 mins Cloud ArchitectureNetworkingWi-Fi podcast Has the hype around ‘Internet of Things’ paid off? | Ep. 145 Apr 18, 202436 mins IoT PlatformsIoT Security podcast Episode 1: Understanding Cisco’s Converged SDN Transport Sep 24, 202120 mins Cisco SystemsInternetNetworking podcast Episode 2: Pluggable Optics and the Internet for the Future Sep 23, 202117 mins Cisco SystemsInternetOptical Drives video How to use the lsblk command Feb 13, 20251 mins Linux video How to use the fdisk command Feb 11, 20251 mins Linux video How to use the du command Feb 09, 20251 mins Linux