Stories by Network World staff

Huawei: House Intelligence Committee report is 'not fact-based'

The United States is a country ruled by law, where all charges and allegations should be based on solid evidence and facts. The report conducted by the House Permanent Select Committee on Intelligence (the Committee), which took 11 months to complete, failed to provide clear information or evidence to substantiate the legitimacy of the Committee's concerns.

Network World staff | 09 Oct | Read more

The state of network security

Network security is still as necessary as it was 15 years ago when the Black Hat Conference was first beginning. Sure the players have changed and the sophistication, but it is a classic good vs. evil scenario still.

Network World staff | 31 Jul | Read more

12 ways to visualize network security

Remember the old M&M analogy - security is like an M&M candy, hard shell on the outside, soft on the inside. In other words, put up firewalls, built a strong perimeter and you're good to go. Of course, nobody believes that M&M-type security is sufficient in today's world of insider threats, data leakage, mobile workers, thumb drives and sophisticated malware. So, what's the new metaphor? We asked around and came up with a number of interesting and useful ways to think about enterprise security.

Network World staff | 15 Jul | Read more

Bogus security promises and how to detect them

What is true enterprise security and how do you get it? Bogus promises by vendors are all too common. In this interview, outspoken security analyst Nick Selby humorously tackles the truth about data leakage products, smartphone protection, hotspot threats and the word "solution." Nick Selby leads The 451 Group's Enterprise Security Practice. Selby also serves as The 451 Group's Director of Research Operations and is on the faculty of the Institute for Applied Network Security.

Network World staff | 14 Mar | Read more

FAQ on NAC

Network access control stands out as one of the most promising security technologies, but it also is one of the most misunderstood. Here are explanations that may clarify some of your questions.

Network World staff | 04 Jan | Read more

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release

Market Place