Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Avira launches SafeThings, a new solution designed to help ISPs and manufacturers build security into home routers [Read More]
Researchers have found that the internet suffers an average of 28,700 distinct DoS attacks every day. This is claimed to be 1000 times greater than other reports have indicated. [Read More]
Savitech drivers used by several companies that provide specialized audio products expose PCs to attacks by installing a new root certificate [Read More]
Cisco releases updates for several security, networking and cloud products to address high severity DoS and injection vulnerabilities [Read More]
Cryptonite, a startup that aims to prevent reconnaissance and lateral movement using moving targe defense (MTD) and micro-segmentation technologies, emerges from stealth mode [Read More]
Security analytics firm Skybox raises $150 million to advance its cybersecurity management product [Read More]
Symantec announces new capabilities in Symantec Endpoint Protection (SEP) and claims it’s leapfrogging the competition [Read More]
Study shows one-third of industrial networks are accessible from the Internet and 10% of OT networks are already infected with malware [Read More]
A new, massive Mirai-linked botnet is recruiting improperly secured IoT devices such as IP wireless cameras [Read More]
Security firm discloses several unpatched vulnerabilities affecting Linksys E-series wireless routers [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

John Maddison's picture
Cybercriminals have begun to leverage automation and machine learning in their attack tactics, techniques, and procedures (TTP).
Justin Fier's picture
Organizations still using the legacy approaches from a year ago to five years ago are consistently outpaced and forced to play catch-up.
Marc Solomon's picture
It is important to have a prioritized list of vulnerabilities based on the threats to your organization; this list will be different for each company based on their environment and risk profile.
John Maddison's picture
Here are six things every organization needs to consider when approaching security, especially during the chaos and time pressures of a network undergoing digital transformation.
David Holmes's picture
DUHK and ROCA are both implementation-specific vulnerabilities concerning one of my favorite topics, random number generators.
Ashley Arbuckle's picture
If you’re among the majority taking an architectural approach to consolidate security vendors then remember, your best defense is a good offense.
Jennifer Blatnik's picture
You can slow down a hacker, but it will do you good to accept that you may never be able to truly stop someone from getting through your first line of defense.
Oliver Rochford's picture
To succeed in an era of rapidly evolving threats and emerging technology and the resulting shortfall of actionable evidence and lack of certainty, hypothesizing is the closest we can get to prediction.
Siggi Stefnisson's picture
SSL encryption can create blind spots in many organizations, as malware in the HTTPS channel is essentially hidden from most web security tools.
Alan Cohen's picture
There are different types of segmentation architectures: network centric, hypervisor centers, or distributed. Let’s take a look at each one and review the puts and takes of each approach.