|North Korea bought black market rocket engines, study says|
Added: 15.08.2017 2:20 | 1 views | 0 comments
North Korea may have used illicit trade networks to purchase powerful rocket engines once produced by a Ukrainian factory that was instrumental to the Soviet missile program -- a claim that could help explain the surprising leap forward in long-range missile capability demonstrated by the rogue nation in recent months, according to new analysis from the International Institute for Strategic Studies.
|Kaseya Improves Automation, Visualization for Network MonitoringKaseya Improves Automation, Visualization for Network Monitoring|
Added: 14.08.2017 16:50 | 0 views | 0 comments
The latest version of the network monitoring package features automated, real-time insights into the performance of hybrid IT infrastructures and distributed data centers.
|10 Key Benefits of Passive Optical LANs for Enterprise Connectivity10 Key Benefits of Passive Optical LANs for Enterprise Connectivity|
Added: 02.08.2017 18:02 | 3 views | 0 comments
Enterprises are reaping the rewards of adopting passive optical LANs for their network infrastructures. Here are 10 benefits to moving to POLs.
|How VPN Restrictions Imposed by China, Russia Impact Internet FreedomHow VPN Restrictions Imposed by China, Russia Impact Internet Freedom|
Added: 01.08.2017 17:54 | 8 views | 0 comments
Privacy on the internet will be harder than ever to maintain in China and Russia after the two nations severely restricted the use of virtual private networks within their borders. China has instituted regulations that require all VPN apps used within its borders to be registered with the government. Russia went even further in July when it announced a ban on the use of VPNs and other anonymizing technology starting Nov. 1. These countries argue that the rules are aimed at rooting out lawlessness on the internet. But the bans also impact international trade, as Apple has been forced to remove VPN apps that violate China's VPN registration requirement from its App Store. This slide show covers the implications of the VPN bans around the world.
|Verizon the Clear Winner in Rootmetrics Nationwide Network EvaluationVerizon the Clear Winner in Rootmetrics Nationwide Network Evaluation|
Added: 31.07.2017 16:25 | 4 views | 0 comments
The latest Rootmetrics study of mobile carrier performance finds that Verizon has the best overall performance, while T-Mobile came in last, despite its talk about superior network performance.
|Webinar July 11: Learn How a Virtual Networking Approach Can Strengthen the Security of Federal NetworksWebinar July 11: Learn How a Virtual Networking Approach Can Strengthen the Security of Federal Networks|
Added: 06.07.2017 19:01 | 17 views | 0 comments
Discover the new strategies government agencies are using to protect themselves from cyberthreats.
|AT&T Says White Box Switches Essential to Network TransformationAT&T Says White Box Switches Essential to Network Transformation|
Added: 05.07.2017 16:30 | 7 views | 0 comments
Company officials say the carrier’s move to a software-centric infrastructure will rely in large part on using such open networking gear.
|LinkedIn Open Sources a Pair of Incident-Escalation ToolsLinkedIn Open Sources a Pair of Incident-Escalation Tools|
Added: 01.07.2017 7:40 | 15 views | 0 comments
Social network said it has seen huge internal adoption of these tools, even from non-technical teams, such as sales.
|You are key to keeping your computer safe|
Added: 29.06.2017 16:20 | 8 views | 0 comments
Yet another major cyber extortion campaign is wrecking computer networks all over the world -- and we need to start thinking about cyber safety more comprehensively and include users in solving the problem. This effort must begin with an assessment of user risk, not just technical risk -- because all signs indicate that there is still worse to come.
|Webinar June 29: Five Advantages of Cloud-Based SIEM for Security Intelligence and OperationsWebinar June 29: Five Advantages of Cloud-Based SIEM for Security Intelligence and Operations|
Added: 28.06.2017 12:08 | 9 views | 0 comments
Learn why security teams looking to extend their network perimeter defenses with an attack and breach detection capability are turning to a hosted SIEM, an approach that gets them up and running faster.