Enterprises are realizing they might need more ammunition in their never-ending battle against ransomware. Enter network forensics, a branch of digital forensics. Network forensics practitioners are the detectives of network security, focused on monitoring and evaluating all the digital traffic on a network. Their goal is to uncover information about intrusions, such as malware, and […]
Multi-Cloud Challenges, AI Integration and Agentic AI
RSAC Conference 2025 was rife with hype about agentic AI, quantum computing and security for critical infrastructure. But in the day to day of network security operations, enterprises are facing complex environments, growing cybersecurity threats and disparate tools. In this video, Ketaki Borade, senior analyst of infrastructure security at Omdia, spoke with Informa TechTarget’s Eye […]
DriveNets Brings its Network Cloud to AI Data Centers
DriveNets, best known for bringing cloud-native, software-centric networking to service providers, recently released a series of Ethernet packages to meet the unique needs of AI data centers. While the technology mania for AI initially centered on silicon, IT leaders are starting to understand that the network plays a critical role in the success of AI. […]
Guidance for Enterprises, Vendors Amid Global Tariff Turbulence
There’s hope for enterprises and vendors struggling to assess changes in the way they build and bring products to market during turbulent tariff times and geopolitical unrest. PwC reported that the average tariff rate on U.S. imports for the technology, media and telecom (TMT) industry could rise from 2% to 44%, significantly increasing costs. The […]
Can CDNs be a Multi-Purpose Technology?
The content delivery network model offers key benefits to designers building enterprise networks. CDNs accelerate the delivery of internet content through a framework of geographically distributed and interconnected servers with cached storage of frequently asked information. User requests are answered by the server closest to their geographic location, thus speeding up delivery. This approach eliminates […]
My 4 Go-To Tools for Wi-Fi Troubleshooting
Wi-Fi problems are some of the trickiest to troubleshoot. Having the right tool for the job matters when connectivity is fickle and fleeting. After spending a few years consulting and troubleshooting for wireless, I’ve found these four tools to be valuable in my Wi-Fi kit. WLAN Pi M4+ The WLAN Pi M4+ tool is the […]
The Network Intelligence Blueprint
In my previous article about the third era of networking, I made the case that if your network is a strategic asset, you need to develop DevOps-style network automation practices. But where do you begin this journey of technological transformation? With documentation, the essential foundation that reduces business risk, accelerates innovation and drives digital transformation. […]
Why Enterprises are Reopening their Wallets
After nearly two years of economic uncertainty, enterprises have reopened their wallets, targeting secure access service edge (SASE) architecture to expand their locations and fend off increasingly sophisticated AI-driven attacks. SASE is a cloud architecture that combines network and cloud-native security technologies, delivered as a single cloud service. SASE offers streamlined provisioning and enhanced security […]
Scaling Enterprise AI with GPU-as-a-Service
As artificial intelligence plays an increasingly central role in enterprise digital transformation, organizations are discovering that they can’t rely solely on centralized cloud infrastructure. Use cases that depend on low latency, real-time processing — such as video analytics, robotics and smart infrastructure — require more flexible deployment options that support tighter control and stronger data […]
Securing Enterprise Supply Chain Networks
In 2024, cyber attacks on worldwide supply chains occurred at the rate of one every two days. According to Cyble, 99% of Global 2000 companies reported that they were directly connected to a vendor that had been hit by a supply chain breach. Supply chain networks are dangerously vulnerable to attacks. A large enterprise can […]












