Network Security

Network Security | News, how-tos, features, reviews, and videos

Zoom video conferencing  >  One user connected via laptop showing a grid of remote participants.
Zoom end-to-end encryption

Phishing e-mails are more prevalent (and dangerous) than ever

Phishing, those malicious e-mails that pretend to be legitimate messages, has been a problem since Canter and Siegel launched the first spam campaign in 1994. (Mea culpa — it seems they learned about this thing called the Internet...

finger on keyboard with email icons floating out of monitor

Is it time to move to hosted Exchange? Considerations for IT

In the wake of serious attacks that exploited vulnerabilities in Microsoft Exchange Server, it may be time to move your mail to the cloud. Here’s what to consider and plan for.

CSO > Azure automation for Let's Encrypt certificates

How Azure Active Directory helps manage identity for remote users

Still using Active Directory to manage identity for remote workers? You might want to consider moving to Azure Active Directory.

The pioneers of SDN

Software-defined networks can give IT the agility and flexibility to manage today's dynamic data centers and private cloud infrastructures. Some early adopters have already jumped on board. Here's what they've learned.

Recommended for You