IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

network security

Cloudflare unveils new One Partner Program with zero trust at its core
A close up photo of Matthew Prince, CEO and co-founder of Cloudflare, speaking on a stage
channel

Cloudflare unveils new One Partner Program with zero trust at its core

Cloudflare CEO Matthew Prince says the initiative aims to take the complexity out of zero trust architecture
24 Jun 2022
Network detection and response market to hit $5.3bn by 2028
Finger pointing towards malware on a piece of code
network security

Network detection and response market to hit $5.3bn by 2028

North America is estimated to hold the largest market share over the forecast period
8 Jun 2022
What is SSID?
wireless router
broadband

What is SSID?

We look at what SSID is and how it is used to connect devices to the internet
7 Jun 2022
Five Eyes leaders issue guidance for MSPs to prevent second SolarWinds attack
A group of hackers behind the Russian flag
Security

Five Eyes leaders issue guidance for MSPs to prevent second SolarWinds attack

The joint advisory published today said MSPs and customers need more vigilant in the wake of Russia's invasion of Ukraine
11 May 2022
Vector Capital acquires majority ownership of WatchGuard
An image of a digital padlock
Security

Vector Capital acquires majority ownership of WatchGuard

Global private equity firm gobbles up shares from co-investors as it doubles down on its commitment to the cyber security platform provider
29 Apr 2022
Top online cyber security courses for 2022
A close up shot of someone pressing a keyboard key on a laptop covered in blue and red lighting
Careers & training

Top online cyber security courses for 2022

Our top picks from the plethora of cyber security courses available, including a mix of free and paid, and those aimed at experts and beginners
5 Apr 2022
Auvik Network Management review: A breeze to deploy
Auvik Network Management screenshot
Network & Internet

Auvik Network Management review: A breeze to deploy

Auvik’s cloud-hosted monitoring is quick to provide a complete picture of your network
1 Apr 2022
New MFA security standards for online payments come into force
Man holding credit card making online payment on a tablet
two-factor authentication (2FA)

New MFA security standards for online payments come into force

Version 4.0 of PCI DSS also reforms password requirements and broadens its terminology to address other network access controls
31 Mar 2022
Vodafone and Ericsson complete UK's first 5G network slicing trial
Top view of people walking in different directions of pattern, painted on asphalt as visual representation of network slicing
5G

Vodafone and Ericsson complete UK's first 5G network slicing trial

Network slicing allows businesses and app developers to carve out a ‘slice’ of the network suited to specific use cases
15 Mar 2022
What is Strong Customer Authentication (SCA) under PSD2?
Online payment
two-factor authentication (2FA)

What is Strong Customer Authentication (SCA) under PSD2?

An in-depth look at the EU directive that aims to harmonise online payment protection
14 Mar 2022
Edge-to-cloud security webinar
Dark blue webinar screen with orange and light blue circular graphicswhitepaper
Whitepaper

Edge-to-cloud security webinar

Safeguards your IoT devices that require Zero Trust
8 Mar 2022
Successful WAN and security transformation powers the digital enterprise
Dark grey whitepaper cover with white title and circular graphics in pink stripes and a lighter greywhitepaper
Whitepaper

Successful WAN and security transformation powers the digital enterprise

Applications are delivered in the cloud - security should be too
8 Mar 2022
Edge to cloud security: A new WAN and security edge
Orange whitepaper cover with image of someone at a laptop on a video conference call with other people smiling backwhitepaper
Whitepaper

Edge to cloud security: A new WAN and security edge

A practical guide to adopting a secure access service edge (SASE) architecture
8 Mar 2022
Introducing the zero trust edge model for security and network services
Whitepaper cover with black block across the top and yellow, green and black pipe graphics with title and copywhitepaper
Whitepaper

Introducing the zero trust edge model for security and network services

Get a better understanding of emerging zero trust solutions
8 Mar 2022
The state of SD-WAN, SASE and zero trust security architectures
Whitepaper cover with graphic of a man stood on a laptop in front of a padlock, in front of a cloud with a server in the cloud, plus other peoplewhitepaper
Whitepaper

The state of SD-WAN, SASE and zero trust security architectures

Be a leader in the deployment of zero trust, SD-WAN and SASE
8 Mar 2022
Cisco patches bug that could break its email security service with a single message
A Cisco sign on a street corner next to a red traffic light
cyber security

Cisco patches bug that could break its email security service with a single message

A carefully crafted email could freeze Cisco's Email Security Appliance interface and stop it processing messages
17 Feb 2022
Remote access to businesses sold for huge profit in growing dark web operation
A digital padlock representing security
cyber security

Remote access to businesses sold for huge profit in growing dark web operation

Researchers told IT Pro the lucrative business model is reaching 'full maturity' but has opportunities to become even more profitable in the near futu…
16 Feb 2022
Juniper acquires cloud networking startup WiteSand
Juniper Networks sign on a building
Acquisition

Juniper acquires cloud networking startup WiteSand

The deal will enable Juniper to advance traditional NAC solutions using AI and the cloud
15 Feb 2022
Building IT antibodies to fight future shocks
A computer generated image of a syringe with a mouse pointer hovering over it
IT infrastructure

Building IT antibodies to fight future shocks

As enterprises look towards their post-COVID futures, they must ensure their IT systems are robust, secure, and resilient
9 Feb 2022
Cloudflare opens $3,000 bug bounty program to the public
Data
bugs

Cloudflare opens $3,000 bug bounty program to the public

The company's previous program paid out around $212,000 over its lifetime
3 Feb 2022
Openreach offers £20,000 reward for information on stolen copper cables
Detail of a BT Openreach van and a coil of yellow broadband fibre cable on the ground and awaiting installation
broadband

Openreach offers £20,000 reward for information on stolen copper cables

Openreach head of Security Services Richard Ginnaw said that the thefts had “severely impacted" the day-to-day lives of people in Cambridgeshire
21 Jan 2022
The UK's IoT proposals are riddled with ‘astonishing’ gaps
Image of small robots connected to represent a botnet
Internet of Things (IoT)

The UK's IoT proposals are riddled with ‘astonishing’ gaps

The Product Security and Telecommunications Infrastructure (PTSI) Bill aims to address the connected devices security nightmare, but experts agree it …
19 Jan 2022
Ransomware: Why only the bravest businesses will survive
A chained lock situated on a laptop displaying a red screen
ransomware

Ransomware: Why only the bravest businesses will survive

With ransomware attacks a matter of when, not if, the secret to protecting your reputation lies in honesty and transparency
17 Jan 2022