Security Experts:

long dotted


Communications encrypted with the transport layer security (TLS) protocol are also vulnerable to Padding Oracle On Downgraded Legacy Encryption (POODLE) attacks, according to researchers.
OpenDNS unveiled a new security platform and APIs designed to enable security vendors to integrate with OpenDNS’s network and extend their threat protection across any device in any location.
A major distributed DDoS attack was launched against a customer of Florida-based DNS provider DNSimple which peaked at 25 Gbps and 50 million PPS.
A new version of OpenVPN was released to address a critical denial-of-service (DoS) vulnerability (CVE-2014-8104) that can be exploited to cause servers to crash.
A reflected cross-site scripting (XSS) vulnerability has been identified in the management interface of the Alcatel-Lucent 1830 Photonic Service Switch.
A10 Networks has launched a new version of its Thunder Threat Protection System (TPS) solution with improvements in programmability, mitigation, detection and visibility.
Attackers managed to Hijack the domain name for and alter the DNS settings to redirect users to other sites.
NexDefense announced the availability of a new an Industrial Network Anomaly Detection (INAD) system designed to help customers detect and respond to abnormal behavior within their control system environments.
Microsoft reported that some users who have applied patch (MS14-066) to address the Schannel Remote Code Execution Vulnerability (CVE-2014-632) 1are having issues, including a fatal alert related to the TLS protocol.
Security experts share their thoughts on the "Darkhotel" espionage campaign and provide recommendations for executives who travel a lot and don't want sensitive corporate information to end up in the hands of cyber spies.

FEATURES, INSIGHTS // Network Security

rss icon

Rebecca Lawson's picture
Moving towards an adaptive and automated way of applying intelligence based on behavior and heuristics is clearly moving in the right direction to enable a more actionable and relevant set of controls.
Pat Calhoun's picture
A faster, poorly secured network can actually accelerate the spread of APTs, while building protection against threats can slow down networks.
David Holmes's picture
Since its inception, SSL has been plagued by “man-in-the-middle” attacks, and in the past the twenty years, only slight progress has been made toward properly defending against it.
Tal Be'ery's picture
Passwords needs to be strong enough to resist a guessing attack, often named a "Brute-force" attack. The brute-force attack comes in two flavors: online and offline.
Pat Calhoun's picture
A growing number of corporate IT and security personnel have something in common with extreme athletes: they take unnecessary security risks.
Scott Gainey's picture
Panic triggers a response that often leads to potentially catastrophic mistakes. Those mistakes come as we grasp for short-term fixes that give us a stronger sense of control, but don’t take long term consequences into account.
Scott Simkin's picture
As more organizations build applications other than Web and corporate email into the course of their business, adversaries are taking note and adjusting their tactics.
Joshua Goldfarb's picture
Because of the large volume of even the highest priority alerts, analysts are not able to successfully review each event. And with a large number of false positives, analysts become desensitized to alerts and do not take them seriously.
Avi Chesla's picture
In order to reap the greatest benefit from virtualization, SDN and NFV concepts, the control and data-plane functions of network security devices should be decoupled.
Pat Calhoun's picture
Adapted firewall VPN technology ensures network efficiency at a fraction of the cost of MPLS acquisition, with failover support to eliminate the pains of packet loss and minimize the impact on the user.