Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Singapore's prime Minister Lee Hsien Loong has defended the country's controversial decision to cut off civil servants' work computers from the Internet [Read More]
A DoS vulnerability related to IPv6 processing has been found to affect both Cisco and Juniper Networks products [Read More]
Singapore confirmed it would cut off Internet access for government work stations within a year for security reasons, a surprise move in one of the world's most wired countries. [Read More]
Dominated by an overall increase in the number of distributed denial of service (DDoS) attacks, the first quarter of 2016 also saw a record number of attacks larger than 100 Gbps, a report from Akamai reveals. [Read More]
Rapid7's National Exposure Index is a port scan and exposure index of the entire Internet. [Read More]
Fortinet acquires network security monitoring and analytics company AccelOps for $28 million in cash [Read More]
Cisco releases patches for medium and high severity vulnerabilities in Prime Network Analysis Module products [Read More]
Inexpensive devices can be used to wirelessly alter the time on NTP servers, researchers demonstrate at HITB hacker conference [Read More]
For all of last week and continuing into this week, major DNS and traffic management provider NS1 suffered a continuing and complex DDoS attack from unknown attackers with unknown motivation. [Read More]
Cisco has updated AsyncOS for Web Security Appliance to patch several high severity DoS vulnerabilities [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Ashley Arbuckle's picture
Regardless of what industry you’re in, your ability to successfully compete in the digital economy requires the ability to securely innovate.
Emily Ratliff's picture
The Assimilation Project performs service discovery and inventory of your systems in great detail and stores the resulting data so that it can be queried.
Joshua Goldfarb's picture
The trust between those who run the security organization, and the analysts, incident responders, engineers, and others who do the work on a daily basis is extremely important.
Johnnie Konstantas's picture
When I decided to write a piece on metadata, my first thought was: How can I make this short and sweet, like metadata? My next thought: A haiku!
Alan Cohen's picture
If security can increasingly be distributed into the compute layer—effectively a form of self-protection—we begin to shift the playing field from attacker to defenders.
Ken McAlpine's picture
The emergence of IoT may finally be the technology that brings security from a network afterthought and bolt-on technology to an integral, persistent, omnipresent part of the network.
Avi Chesla's picture
Security technologies must be provisioned with the right policy in order to ensure it complements the neighboring solution, and must also be activated in the right sequence.
Shlomo Kramer's picture
When it comes to deciding why you should re-evaluate security vendors, the solution’s roadmap is of strategic importance because it may require technical analysis and rethinking of the overall network security architecture.
Scott Harrell's picture
Granular network segmentation is a security best practice that dramatically curtails the ability of attackers to move about the network, limiting the spread of destructive malware and ransomware and helping to keep critical assets safe.
David Holmes's picture
How do you secure application components when they’re shifting from cloud to cloud? Any traffic traversing from one public cloud to another is by definition crossing the Internet and should therefore not be trusted.