Editor’s picks: Managing modern risksfeatureDownload the AI Risk Management Enterprise Spotlight We explore the risks to both IT and the business from the use of AI. The goal of your risk management efforts should be to gain the most value from AI as a result.By CIO.com and CSOonline.com staffMar 03, 20251 minRisk Management news Hackers gain root access to Palo Alto firewalls through chained bugsBy Shweta SharmaFeb 19, 20251 minNetwork SecurityVulnerabilitiesfeature What is SASE? A cloud service that marries SD-WAN with securityBy Jeff VanceFeb 13, 202515 minsData CenterSASESD-WAN analysisVPN vs. ZTNA: Cisco tackles pros and consBy Denise Dubie Feb 11, 20256 minsNetwork SecurityVPNZero Trust newsSpy vs spy: Security agencies help secure the network edgeBy Lynn Greiner Feb 06, 20257 minsEnterprise RoutersFirewallsIoT Security newsCisco researchers highlight emerging threats to AI modelsBy Michael Cooney Feb 04, 20254 minsNetwork Security news analysisWhat is NaaS? Providers, delivery models, and benefits explainedBy Network World staff Jan 31, 20259 minsNetwork Management SoftwareNetwork SwitchesNetwork Virtualization newsWhat is Transport Layer Security? How TLS1.3 protects your dataBy Zeus Kerravala Jan 31, 20256 minsData CenterNetworkingSecurity analysisAI investments face integration, compliance, and skills challenges: surveyBy Denise Dubie Jan 30, 20253 minsNetwork Management SoftwareNetwork MonitoringNetwork Security Enterprise Buyer’s Guides Feature, How-To Buyer’s guide: How to shop for network observability tools Network observability tools can help enterprises more quickly identify, troubleshoot, and resolve performance issues across complex environments before they impact end-user productivity. Jul 22, 2024 18 mins Data Center Network Management Software Network Monitoring More SecuritynewsPalo Alto expands secure private 5G network partnershipsPalo Alto says protecting the growing range of private 5G network services can be challenging for enterprise customers By Michael CooneyMar 03, 20254 minsIoT SecurityMobile SecurityWireless Security news Cisco’s ISE bugs could allow root-level command executionBy Shweta SharmaFeb 07, 20251 minSecurityVulnerabilitiesnews Fortinet targets branch offices with upgraded firewallsBy Michael CooneyFeb 06, 20252 minsFirewallsNetwork SecurityRemote Access Security how-toDownload the extended detection and response (XDR) buyer’s guideBy Tim Ferrill Feb 05, 20251 minEnterprise Buyer’s GuidesIntrusion Detection SoftwareNetwork Security newsAMD patches microcode security holes after accidental early disclosureBy Evan Schuman Feb 03, 20255 minsCPUs and ProcessorsSecurity newsAMD’s unpatched chip microcode glitch may require extreme measures by CISOsBy Evan Schuman Jan 23, 20251 minCPUs and ProcessorsSecurity brandpostSponsored by IDCAI at Work: How SOS 102 is Building Safer Communities in KazakhstanBy IDC Jan 23, 20254 minsSecurity brandpostSponsored by ZscalerA CSO's perspective: 8 cyber predictions for 2025By Zscaler Jan 14, 202510 minsSecurity newsCompTIA bolsters security penetration testing certificationBy Denise Dubie Jan 09, 20254 minsCertificationsIT JobsSecurity ArticlesbrandpostSponsored by Zscaler2025 ransomware predictions, trends, and how to prepareThe future of cybersecurity lies in fighting AI-powered ransomware with smarter defenses…are you prepared?By Zscaler Jan 06, 2025 3 minsRansomwareSecurityZero TrustnewsMore telecom firms were breached by Chinese hackers than previously reportedSalt Typhoon’s latest victims include Charter, Consolidated, and Windstream, underscoring the widening scope of China’s cyberespionage campaign against critical US infrastructure.By Gyana Swain Jan 06, 2025 1 minData BreachSecurityTelecommunications Industryanalysis5 network automation startups to watchAutomating network processes can head off issues and speed resolution of problems while cutting the workload of IT pros.By Jeff Vance Dec 23, 2024 10 minsNetwork Management SoftwareNetworkingSecuritybrandpostSponsored by ZscalerThreats delivered over encrypted channels continue to riseAnalysis highlights cyberattack trends, top threat categories, most common attack targets, and other insights.By Zscaler Dec 20, 2024 7 minsSecuritynewsUS moves to tighten restrictions on China Telecom amid security fearsLast week, the government issued a preliminary ruling deeming China Telecom Americas’ US network and cloud operations a national security risk.By Prasanth Aby Thomas Dec 17, 2024 4 minsCloud ComputingTechnology IndustryTelecommunicationsnewsAMD data center chips vulnerable to revealing data through ‘BadRAM’ attackResearchers find a way to access encrypted data in AMD EPYC data center chips using rogue memory modules.By John E. Dunn Dec 12, 2024 1 minCPUs and ProcessorsSecuritybrandpostSponsored by ZscalerSecure shadow data in the cloud with new innovations on Zscaler DSPMSecuring sensitive data in the cloud era: How Zscaler DSPM leads the way…and creates peace of mind. By Moinul Khan Dec 04, 2024 4 minsCloud ComputingSecurityhow-toDownload the Cloud Optimization Enterprise SpotlightFrom our editors: We look at how IT leaders are reworking their cloud implementations for better fit to their needs, as well as how they can control cloud costs and ensure cloud security.By CIO staff Dec 02, 2024 1 minCloud ComputingCloud ManagementCloud SecuritynewsCISOs who delayed patching Palo Alto Vulnerabilities now face real threat CISA said it has evidence of active exploitation for two out of six Expedition vulnerabilities Palo Alto Networks patched in October.By Shweta Sharma Nov 15, 2024 1 minFirewallsSecurityVulnerabilitiesbrandpostSponsored by ZscalerEliminating Lateral Threat Movement INSIDE factory, branch, and campus networksEnhancing network security: Zscaler's Zero Trust Device Segmentation for protecting against lateral attacks—learn more today.By Zscaler Nov 06, 2024 9 minsNetworkingSecurityhow-toBuyer’s guide: Data protection for hybrid cloudsTo safeguard enterprise data in hybrid cloud environments, organizations need to apply basic data security techniques such as encryption, data-loss prevention (DLP), secure web gateways (SWGs), and cloud-access security brokers (CASBs). But such security is just the start; they also need data protection beyond security. By Neal Weinberg Nov 04, 2024 13 minsCloud ManagementData and Information SecurityHybrid CloudbrandpostSponsored by ZscalerBusiness continuity that enables users to continue secure operations, even during a catastrophic eventBy Zscaler Oct 28, 2024 7 minsSecurity Show more Show less View all Upcoming Events15/May in-person event FutureIT Los AngelesMay 15, 2025The Biltmore Artificial IntelligenceEventsRemote Access Security 25/Jun in-person event FutureIT DallasJun 25, 2025Union Station Artificial IntelligenceEventsRemote Access Security 17/Jul in-person event FutureIT New YorkJul 17, 2025Convene, New York, NY Artificial IntelligenceEventsRemote Access Security View all events Resources whitepaper The Wide World of Cyber Resilience: A CISO’s Insights & 2025 Advances Join us for this month’s coffee break as they’ll tackle the latest in cyber resilience, cutting through the noise to share actionable insights and practical defense strategies. The post The Wide World of Cyber Resilience: A CISO’s Insights & 2025 Advances appeared first on Whitepaper Repository –. By Pure Storage 11 Mar 2025IT OperationsRansomwareSecurity whitepaper Cybersecurity meets workflow automation: The unmatched value of an integrated platform By Palo Alto Networks 10 Mar 2025Business OperationsCyberattacksSecurity whitepaper Navigating the AI Hype in Cybersecurity By Sophos 10 Mar 2025CybercrimeDigital TransformationSecurity View all Video on demand videoHow to prepare Office 365 and Windows for a disasterWith IT and security teams stressed due to the COVID-19 crisis, it’s more important than ever to make sure you’ve prepared your network for a disaster. Apr 01, 2020 6 minsSecurity See all videos Explore a topic 5G Careers Cloud Computing CPUs and Processors Data Center Edge Computing Enterprise Storage Generative AI Industry Internet of Things Linux Networking Network Management Software Virtualization Show me morePopularArticlesPodcastsVideos news 2025 network outage report and internet health check By Ann Bednarz Mar 11, 202526 mins Internet Service ProvidersNetwork Management SoftwareNetworking news Altera targets low-latency AI edge applications with new FPGA products By Andy Patrizio Mar 11, 20253 mins CPUs and ProcessorsRoboticsServers news Fortinet reinforces OT network security platform By Michael Cooney Mar 11, 20254 mins IoT SecurityRemote Access SecuritySecurity Information and Event Management Software podcast Has the hype around ‘Internet of Things’ paid off? | Ep. 145 Apr 18, 202436 mins IoT PlatformsIoT Security podcast Episode 1: Understanding Cisco’s Converged SDN Transport Sep 24, 202120 mins Cisco SystemsInternetNetworking podcast Episode 2: Pluggable Optics and the Internet for the Future Sep 23, 202117 mins Cisco SystemsInternetOptical Drives video How to use the vmstat command Feb 25, 20251 mins Linux video How to use the Alias Command Feb 25, 20252 mins Linux video How to use exit codes Feb 21, 20252 mins Linux