Network Security
Latest about Network Security

The top zero trust use cases
By ITPro published
Whitepaper The challenges organizations solve to reduce risk and cost

The power of the One True Zero Trust Platform
By ITPro published
Whitepaper Delivering unparalleled security and superior economic value

Barracuda Networks says hacked devices “must be immediately replaced” despite patches
By Ross Kelly published
News Seven-month exploitation of a critical vulnerability enabled persistent backdoor access in its email security gateway devices

Warning issued over ‘widespread’ exploitation of Zyxel NAS devices
By Ross Kelly published
News Zyxel has been forced to issue patches for several vulnerabilities affecting NAS devices

Barracuda network appliance vulnerability “actively exploited” for seven months
By Ross Kelly published
News The company has issued a patch, but warned customers that the vulnerability left them exposed for over half a year

ASUS, Cisco, Netgear devices exploited in ongoing Chinese hacking campaign
By Ross Kelly published
News Critical national infrastructure is the target of sustained attempts from state-sponsored hackers, according to Five Eyes advisories

How applications are attacked
By ITPro published
whitepaper A year in application security

Journey to SASE
By ITPro published
whitepaper Modernize connectivity to drive business agility
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.