That software-defined networking (SDN) is a coming reality is starting to gain traction in IT security circles, with some vendors arguing it could lead to a level of interoperability in security largely missing at present.
IETF - News, Features, and Slideshows
Security and how to protect users from pervasive monitoring will dominate the proceedings when members of Internet Engineering Task Force meet in London starting Sunday.
The Internet Engineering Task Force is close to approving a specification for a common format for reporting e-crime, a step taken to allow security experts to react faster to cybercrime.
The Internet Engineering Task Force has set up a wiki to document which of its standards were successful and why.
The Internet engineering community is grappling with what to do about a serious flaw in the DNS discovered mid-year, and the ongoing debate brings to mind a famous quotation from Voltaire: "The perfect is the enemy of the good."
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.
Perhaps the single-most significant standards based technological advancement in the field of unified communications over the past year has been the completion of Web Real Time Communication (WebRTC) standard and the appearance of several WebRTC based implementations.
We've been hearing about the impending depletion of IPv4 addresses for years, but that day is finally upon us -- the free supply of IPv4 numbers in North America will be completely gone within a month or two.
<em>This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.</em>
The challenge for data center operators selecting a high performance transport technology for their network is striking the ideal balance between acquisition, deployment and management costs, and support for high performance capabilities such as the remote direct memory access (RDMA) protocol.
- Join special guest Jeff Lanza, Retired FBI Agent (USA), Ty Miller, Mark Gregory & Andy Solterbeck for a discussion on ransomware security
- As networks evolve, visibility remains key to managing IT-security risk in business terms
- Join Skeeve Stevens, Stanley Shanapinda, and more on how to manage metadata to maximise your ability to detect and prevent an attack. Register
- See Your Traffic for What It Really Is
- The Future is Encrypted. Manage It.
- CLOUDSEC2016 - Timothy Wallach, Cyber Taskforce FBI (USA) speaks on the status & evolution of global cybercrime. Save your seat
- Test Your Knowledge of Network Encryption
- Next-generation SIEM turns low-level security monitoring for high-level business goals
- Ransomware explosion is the latest security wakeup call for CxOs
- Start your cloud journey. Register now and learn a wide range of AWS cloud solutions covered in the monthly AWS Webinar Series.
- AISA 2016 | Hear from Bruce Schneier, David Lacey, Rik Ferguson and many more | 18-20th October Register Today
- Caution: That SSL Blind Spot is Growing
- New Destination Gigamon Security Resources IS HERE