Network protocols News
January 20, 2017
SSH creator Tatu Ylonen talks with SearchSecurity about how the cryptographic network protocol has grown over the years and why poor SSH security is jeopardizing enterprises today.
September 28, 2016
Domain name system watchdog ICANN has begun the process of updating the DNS root zone signing key to strengthen DNSSEC protection against man-in-the-middle attacks.
August 09, 2016
Black Hat: New research finds DDoS DNS amplification attacks are more likely to use SSDP than NTP and DDoS attacks may generally be smaller than reported.
December 22, 2015
Our most-read SDN news stories of the year reveal a collective obsession with SD-WAN, as well as a strong interest in the future of open SDN.
Network protocols Get Started
Bring yourself up to speed with our introductory content
Workplace IoT is full of both possibilities and complexities. Here's a five-step approach to begin to realize the potential of smart spaces. Continue Reading
Spotlight article: Shon Harris explains the core concepts in the CISSP domain on software development security, including models, methods, database systems and security threats. Continue Reading
Spotlight article: Shon Harris explains the main concepts in the CISSP domain on telecommunications and networking, including network protocols, extension technologies and more. Continue Reading
Evaluate Network protocols Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Transmitting connected device data requires energy -- a precious commodity in IoT. Learn how WindSpring's IoT data compression technology aims to help ease the pressure on power. Continue Reading
Microsoft security researchers recently introduced a new tool called NetCease that prevents network reconnaissance. Expert Judith Myerson explains how the tool can stop attackers. Continue Reading
MAC address randomization schemes can be beneficial and challenging. Fernando Gont explains what enterprises need to know about randomizing MAC addresses. Continue Reading
Manage Network protocols
Learn to apply best practices and optimize your operations.
This lesson from our network cabling series reviews the Gigabit Ethernet standard, also known as 1000BASE, as well as variations of 10BASE Ethernet. Continue Reading
A WebRTC server usually refers to a few different types of back-end servers, like signaling and media servers, that help connect browser-based communications. Continue Reading
SDN promises to change how networking pros work. Analyst Shamus McGillicuddy shares the top priorities of enterprises tackling SDN retraining. Continue Reading
Problem Solve Network protocols Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Early versions of Nagios Core, the open source network monitoring tool, had privilege escalation vulnerabilities. Expert Judith Myerson explains the flaw and what to do about it. Continue Reading
Too much information? No such thing. Engineer James Ott says network monitoring tool PRTG allows him to anticipate device failures before they occur. Continue Reading
The types of DDoS attacks organizations face have grown and size of these attacks has increased. Expert Michael Cobb explains how to secure systems against common DDoS methods. Continue Reading