Follow Network Computing:
 September 26, 2017

TOP STORIES

Gartner: Don't Fall For the Network Transceiver Scam

Organizations can save money by negotiating better deals on a common piece of network equipment, analysts say.

Using Wireshark to Test Troubleshooting Tools

In this video, Tony Fortunato demonstrates how he used Wireshark to analyze a traceroute utility.

DevOps Barbarians at the Gate

Like it or not, operations teams will need to learn how to code.

9 Insightful Networking Blogs to Follow

Check out these blogs for practical tips and candid opinions on networking technologies and trends.

Hyperconvergence's Missing Piece

Hyperconverged systems don't do much when it comes to networking.

10 Best States for Network and System Administrator Jobs

Which states employ the highest percentage of network admins and sysadmins? The answers may surprise you.

Cisco SMI Still Exposing Network Switches Online

The number of exposed and vulnerable devices online has remained largely unchanged since researchers began exploring SMI in 2010.

Tom Hollingsworth on Changes in the SD-WAN Market

Networking expert Tom Hollingsworth reflects on Cisco's acquisition of Viptela, what it means for the market, and whether it changes how enterprises evaluate SD-WAN options.



CURRENT ISSUE

DOWNLOAD THIS ISSUE! SUBSCRIBE NOW!
BACK ISSUES | MUST READS | TECH DIGEST

Partner Perspectives

Where Do Security Vulnerabilities Come From?
There are three major causes: code quality, complexity, and trusted data inputs.

Artificial Intelligence: Getting the Results You Want
Finding a vendor that doesn't claim to do AI is hard these days. But getting the benefits you need and expect is even harder.

The Hunt for IoT: The Rise of Thingbots
Across all of our research, every indication is that today's "thingbots" - botnets built exclusively from Internet of Things devices - will become the infrastructure for a future Darknet.

Tech Resources

ACCESS TECH LIBRARY NOW

  • Security Implications of Using VoIP & SIP

    This webinar will examine the security implications of using VoIP and SIP, how to best protect real-time communications traffic with tools you already have as well as with new tools, and how to orchestrate protections to prevent UC security from ...

  • How to Talk to Your Management about IT Security

    This webinar will bring you some new methods for describing and measuring your cybersecurity initiatives so that they can be understood by even the most business-oriented executives.

MORE WEBINARS

FEATURED REPORTS

  • [Security Breach Report] Overall Impact of & Steps to Prevent Breaches

    Despite the escalation of cybersecurity staffing and technology, enterprises continue to suffer data breaches and compromises at an alarming rate. How do these breaches occur? How are enterprises responding, and what is the impact of these compromises on the business? ...

  • Surviving the IT Security Skills Shortage

    Cybersecurity professionals are in high demand -- and short supply. Find out what Dark Reading discovered during their 2017 Security Staffing Survey and get some strategies for getting through the drought. Download the report today!

MORE REPORTS

EDITOR'S PICK