Follow Network Computing:
 October 07, 2017

TOP STORIES

SDN: Time to Move On, Gartner Says

Analysts report on the state of software-defined networking and advise enterprises to shift their focus.

DDoS Protection: Arbor Networks vs. Kentik

IT pros cite pros and cons of two products that shield the network against DDoS attacks.

IoT Tipping Point: Connection Capacity

All that data generated by IoT devices won't be valuable without a robust network.

From Law School Dropout to Senior Network Engineer

Amy Arnold talks about her networking career and offers advice to aspiring networking pros.

DNS a 'Victim of its Own Success'

Why securing the Domain Name System remains an afterthought at many organizations.

Big Data Storage: 7 Key Factors

Big data presents challenges for enterprise storage. Here are the top things you should consider.

New Standards Will Shore up Internet Router Security

The BGP Path Validation draft standards were designed to ensure that Internet traffic flows only along digitally signed, authorized paths.

Beyond the Firewall

There are some problems a digital transformation can't fix.



CURRENT ISSUE

DOWNLOAD THIS ISSUE! SUBSCRIBE NOW!
BACK ISSUES | MUST READS | TECH DIGEST

Partner Perspectives

URL Obfuscation: Still a Phisher's Phriend
There are three primary techniques to trick users into thinking a website link is real: URL shorteners, URL doppelgangers, and URL redirects.

TrickBot Rapidly Expands its Targets in August
TrickBot shifted its focus to U.S banks and credit card companies, soaring past the 1,000 target URL mark in a single configuration.

Where Do Security Vulnerabilities Come From?
There are three major causes: code quality, complexity, and trusted data inputs.

Tech Resources

ACCESS TECH LIBRARY NOW

  • 4 Key Steps in Implementing the Data Warehouse of the Future

    Today organizations need performance and flexibility at an affordable price. A Hadoop-based environment offers just that: speed, scalability, and flexibility while minimizing disruption to a company. Join this session to learn how to implement the technology gradually, target the right ...

  • IP Intelligence: The Utility Player for Your Online Business

    Join us as we explore the many benefits of IP Intelligence, and how you can use IPI to improve your customer experience, reduce fraud, improve security, protect digital content, and more. It's the utility player for your online business.

MORE WEBINARS

FEATURED REPORTS

MORE REPORTS

EDITOR'S PICK