Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

AlienVault, a provider of security management tools and threat intelligence solutions, has launched an updated version of its Open Threat Exchange (OTX).
UK-based Darktrace, a cybersecurity startup that leverages machine learning and mathematics to detect threats, has raised $22.5 million in Series B funding from investment firm Summit Partners.
RSA has made improvements to the ECAT threat detection and remediation tool, and the Via Lifecycle and Governance identity management solution.
Verisign has launched a new cloud-based DNS Firewall designed to offer protection from threats and malware, with the ability for customers to customize filtering based on their organizational needs.
Level 3 Communications has paid an undisclosed cash sum to acquire Black Lotus, a provider of Distributed Denial of Service (DDoS) mitigation services.
Deutsche Telekom has teamed up with Intel Security to develop and deploy honey pots that can be embedded in any device, including smartphones and other connected (IoT) devices.
Cisco said on Tuesday that it would pay roughly $635 million to acquire San Francisco-based OpenDNS
Cisco warned on Thursday that as a result of default encryption keys in three of its security products, customers are at risk of an unauthenticated remote attacker being able intercept traffic or gain access to vulnerable systems with root privileges.
Security startup Menlo Security emerged from stealth armed with $25 million in funding from the closing of a Series B funding round.
Cyphort, a provider of threat detection solutions, has secured $30 million in Series C funding, bringing the total raised by the company to more than $53 million.

FEATURES, INSIGHTS // Network Security

rss icon

Alan Cohen's picture
If vaults deep within the building protect banks from bank robbers, why do so many security professionals focus so much attention on their data center’s front door?
Marc Solomon's picture
Accepting the reality that some attacks will get through, security effectiveness must be measured by how quickly we detect a compromise and stop the exploitation of that attack.
Alan Cohen's picture
Many CISOs say that action they undertake in their first six months on the job is to determine the most valuable and most at-risk actions and take steps to mitigate the risk. How can they take those steps while also addressing the catch-22?
David Holmes's picture
As new SSL vulnerabilities surface, we can use our enterprise-specific categorization to decide if it’s going to be a Godzilla day or a Hello Kitty day.
Jason Polancich's picture
In today’s cyber defense world as in other business domains, actions should speak louder than words. Yet, too often, being “actionable” is just that - a word with no meaning.
Alan Cohen's picture
Like other forms of technical debt, security debt must be paid down, which ultimately leads to a more agile and secure enterprise.
Wade Williamson's picture
While malware is obviously a critically important tool in the attacker’s arsenal, it is just one of many that make sophisticated attacks successful.
David Holmes's picture
Whether Shodan's John Matherly intends it to or not, Shodan is already exposing the sham of consumer-grade security that we all suspected would be a hallmark of The Internet of Things.
Rafal Los's picture
Often times it’s the insiders that enable the external attacker – either willingly or otherwise, and the result can be even more devastating than that of an external attacker.
Travis Greene's picture
Can IT security find a way to coexist with wearables faster than the first BYOD war and avoid a second war?