Latest articles for Network World

What to expect from SASE certifications

What to expect from SASE certifications

Secure access service edge (SASE) is a network architecture that rolls SD-WAN and security into a single, centrally managed cloud service that promises simplified WAN…

Cisco adds specializations to its CCNP cert

Cisco adds specializations to its CCNP cert

Cisco’s network certification lineup underwent a major overhaul last year, and one of the big changes is that specialization options appear at the professional level with the…

Network certs 2021: Significant raises for the right ones

Network certs 2021: Significant raises for the right ones

COVID-19 kicked off one of the most disruptive economic periods since World War II, and companies scrambled to shift business processes to the cloud to…

Cisco CCNA certification explained

Cisco CCNA certification explained

The CCNA, which stands for Cisco Certified Network Associate, is Cisco’s foundational certification for networking professionals. The CCNA is a commonly required prerequisite for associate-level…

Energy company deploys edge devices to improve drilling efficiency

Energy company deploys edge devices to improve drilling efficiency

Moving compute and storage resources to edge locations can reduce latency and bandwidth needs, improve performance and save money. At the same time, widespread edge computing deployments…

WAN challenges steer auto-rental firm to SASE

WAN challenges steer auto-rental firm to SASE

Latency and reliability concerns set car rental company Sixt on a path to rearchitect its WAN. That led the global company, which has locations in…

Network training 2021: Businesses grow their own IT expertise to meet new challenges

Network training 2021: Businesses grow their own IT expertise to meet new challenges

As the traditional approach to networking is replaced by hybrid cloud, SD-WAN and edge networks, in-house skill sets haven’t kept up. Hiring new staff is…

Who’s selling SASE and what do you get?

Who’s selling SASE and what do you get?

Secure access service edge (SASE) architecture rolls networking and security into a cloud service, making it easier for enterprises to provide simple, secure access to…

What is SASE? A cloud service that marries SD-WAN with security

What is SASE? A cloud service that marries SD-WAN with security

Secure access service edge (SASE) is a network architecture that rolls software-defined wide area networking (SD-WAN) and security into a cloud service that promises simplified…

SASE helps healthcare company pivot to support remote workers

SASE helps healthcare company pivot to support remote workers

Security and performance concerns made it challenging for TrialCard to enable its employees to work from home when the COVID-19 pandemic hit. Customer service agents…

Enterprises look to SASE to bolster security for remote workers

Enterprises look to SASE to bolster security for remote workers

The coronavirus pandemic has accelerated some companies’ plans to adopt secure access service edge (SASE). Last summer, Gartner estimated SASE adoption at less than 1% of…

Enterprises roll out private 5G while standards, devices, coverage evolve

Enterprises roll out private 5G while standards, devices, coverage evolve

5G promises dramatically faster speeds, lower latency and increased capacity than today’s 4G LTE technology. It’s also a potential alternative to WiFi with greater reliability…

5G is poised to transform manufacturing

5G is poised to transform manufacturing

5G promises not just super-fast connections and more bandwidth than Wi-Fi and 4G LTE but also better connectivity, low latency, and support for thousands of devices in one location, all of…

Private 5G keeps Whirlpool driverless vehicles rolling

Private 5G keeps Whirlpool driverless vehicles rolling

5G promises super-fast connections, low latency and better coverage. In the manufacturing realm, early adopter Whirlpool is deploying a private 5G network in one its Ohio factories to…

Cybercrooks fight over DDoS attack resources

Cybercrooks fight over DDoS attack resources

As more groups get into the denial-of-service attack business they’re starting to get in each other’s way, according to a report released this morning. That…

Ad network takes steps to reduce fraud

Ad network takes steps to reduce fraud

The fraud rates for online ads are scary, with advertisers losing billions of dollars each year.Last week, Pixalate released a report showing that 35 percent…

Automated mitigation on endpoint devices and networks can be tricky

Automated mitigation on endpoint devices and networks can be tricky

Many companies have automated systems in place for preventing, detecting, and investigating security incidents, but automating the incident response and mitigation process for networks and…

How the insurance industry could change the game for security

How the insurance industry could change the game for security

The recent growth in the cyber insurance market is already improving cybersecurity in some industry segments, and has the potential to do more — if…

Latest OWASP Top 10 looks at APIs, web apps

Latest OWASP Top 10 looks at APIs, web apps

The new release of the OWASP Top 10 list is out for public comment from the Open Web Application Security Project, and while most of…

Cyberespionage, ransomware big gainers in new Verizon breach report

Cyberespionage, ransomware big gainers in new Verizon breach report

Verizon released its tenth annual breach report this morning, and cyberespionage and ransomware were the big gainers in 2016.Cyberspionage accounted for 21 percent of cases…

What it takes to become a data security strategist

What it takes to become a data security strategist

Data security strategist is a fast-growing career, and one that will get even hotter as data from AI and IoT inititiatives pours into enterprises. By…

What it takes to become a security systems administrator

What it takes to become a security systems administrator

There are many more openings for security systems administrators than qualified applicants. That creates opportunities for IT professionals willing to get the training and certification.…

Don’t pay ransoms. But if you must, here’s where to buy the Bitcoins

Don’t pay ransoms. But if you must, here’s where to buy the Bitcoins

Ransomware grew into a $1 billion industry last year, and ransom payments now account for nearly 10 percent of the entire Bitcoin economy. Avoiding becoming…

After Amazon outage, HealthExpense worries about cloud lock-in

After Amazon outage, HealthExpense worries about cloud lock-in

Financial services companies as popular targets of cybercriminals for the obvious reason — they’re where the money’s at. And health care companies have medical records,…

Expert: NY breach report highlights third-party risk

Expert: NY breach report highlights third-party risk

New York reported a record high number of breaches last year, just after a new set of cybersecurity regulations went into effect in the state.”In…

Bitcoin rise fuels social media scams

Bitcoin rise fuels social media scams

The price of a single Bitcoin passed that of an ounce of gold for the first time this month, and scammers were quick to get…

Experts: US needs a federal CISO

Last week, the Trump administration announced the appointment of a White House cybersecurity coordinator. That’s a good first step, security experts say, but the government…

Experts divided on value of Cyber National Guard

This past weekend at SXSW, two Congressmen suggested that the U.S. create a cybersecurity reserves system, similar to the National Guard, but the idea has…

Expert: Apple may have deployed unauthorized patch by mistake

Last month, reports came out that Apple accidentally installed a fake firmware patch on internal development servers. That’s a lesson to all companies to be…

Danes targeted by malware spread through Dropbox

Danes targeted by malware spread through Dropbox

Earlier this week, Danish-speaking users were hit by malware spread through Dropbox, but the company responded quickly to shut down the attack. According to a…