Quantcast
Browsing all 1358 articles
Browse latest View live

Defining an Inside Out Security Policy

Defining an Inside Out Security PolicyAuthor Jeff Harris.  "It isn't just about bad apples — people that are deliberately out to steal information or harm organizations." That, from a recent CIO.com...

View Article


Are You Prepared for the Golden Hour of a Security Intrusion

Are You Prepared for the Golden Hour of a Security Intrusion Author: Keith Bromley Are you prepared for the Golden Hour of a network security intrusion? Most enterprises are not. According to an Ixia...

View Article


CVE-2015-7919 Ixia's Application and Threat Intelligence (ATI) Research...

CVE-2015-7919 Ixia's Application and Threat Intelligence (ATI) Research Center Discovers Zero-Day SearchBlox VulnerabilitiesAuthor: Oana Murarasu. Ixia’s ATI Research Center recently discovered...

View Article

Ixia Congratulates 2015 Partner of the Year Recipients at Worldwide Annual...

Ixia Congratulates 2015 Partner of the Year Recipients at Worldwide Annual Sales Meeting  Ixia Congratulates 2015 Partner of the Year Recipients at Worldwide Annual Sales Meeting 

View Article

The Death of RC4 in TLS

The Death of RC4 in TLSAuthor: Anthony Lecorchick. In February 2015, the Internet Engineering Task Force (IETF) released RFC 7465, prohibiting the RC4 cipher suite in TLS. At this point, the IETF...

View Article


Academic Cooperation Program of the Year - 2016

Academic Cooperation Program of the Year - 2016Romanian National Association of Software Industry (ANIS), organized the first edition for Gala Awards for the Software Industry. Ixia is the winner at...

View Article

The Denver Broncos Know How to Address IT's Biggest Challenge

The Denver Broncos Know How to Address IT's Biggest ChallengeAuthor: Roark Pollock It's a college football legend, Paul (Bear) Bryant, who is credited with the adage so many sports fans, players,...

View Article

How Wi-Fi Became Mission Critical

How Wi-Fi Became Mission CriticalThe Ethernet port is dead on mobile. That means our brands, revenue, and reputations run over Wi-Fi. How does this impact mobile device use and development?

View Article


The NSA Does Not Want You to Know About Taps for Network Security

The NSA Does Not Want You to Know About Taps for Network SecurityAuthor: Jonathan Petkevich. It is well known that using network taps for out-of-band monitoring is an effective way to improve both...

View Article


When medical devices and hospital networks become a health risk

When medical devices and hospital networks become a health riskAuthor: Areg Alimian The Food and Drug Administration (FDA) recently issued guidance to medical device manufacturers recommending they...

View Article

User experience monitoring in NFV environments

User experience monitoring in NFV environmentsBy Roark Pollock

View Article

Connected cars in the wild - are you ready and are they ready?

Connected cars in the wild - are you ready and are they ready?There's a fine line between security and convenience when it comes to connected cars, so when will the public be ready to embrace them fully?

View Article

bizEDGE NZ

bizEDGE NZSocial media a gateway for cyber criminals

View Article


Before You Hire a Hacker, Use a Robo Hacker

Before You Hire a Hacker, Use a Robo HackerAuthor: Jason Landry

View Article

MEDIA ALERT: Ixia at the RSA Conference 2016

MEDIA ALERT: Ixia at the RSA Conference 2016CALABASAS, CA — February 17, 2016, Ixia, a leading provider of network testing, visibility, and security solutions, will be exhibiting (Booth # 3201 North...

View Article


Ixia Announces Vision ONE for End-to-End Network Visibility

Ixia Announces Vision ONE for End-to-End Network VisibilityIxia, a leading provider of network testing, visibility, and security solutions, today launched Vision ONE™, a turn-key device that rapidly...

View Article

Ixia and Anritsu Demonstrate Customer Experience Assurance on the HPE OpenNFV...

Ixia and Anritsu Demonstrate Customer Experience Assurance on the HPE OpenNFV Platform at 2016 Mobile World CongressIxia, a leading provider of network test, visibility and security solutions; Hewlett...

View Article


Ixia's Lori Cornmesser recognized as one of CRN's Channel Chief's of 2016

Ixia's Lori Cornmesser recognized as one of CRN's Channel Chief's of 2016Ixia's Vice President of Global Channel Sales, Lori Cornmesser, has been chosen to be one of CRN’s 2016 Channel Chiefs. This...

View Article

Introduction of HTTP/2 and Performance Comparison of HTTP/1 and HTTP/2

Introduction of HTTP/2 and Performance Comparison of HTTP/1 and HTTP/2Date: 2/25/2015, Author: Haiyang Si, Adrian Hada. Ixia ATI’s second strikepack of 2015 brought an implementation of one of the...

View Article

SSDP Reflection DDoS Attacks Emulation on BreakingPoint

SSDP Reflection DDoS Attacks Emulation on BreakingPointDate: 10/27/2014, Author: Haiyang Si. Simple Service Discovery Protocol (SSDP) is part of the Universal Plug and Play (UPnP) Protocol. UPnP...

View Article
Browsing all 1358 articles
Browse latest View live