Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Webroot buys security awareness training company Securecast to offer a security awareness platform to MSPs [Read More]
Russia-linked cyberspy group APT28 targets hotels in Europe and their main target may be government and business travelers [Read More]
Under the principle of set a thief to catch a thief, 250 hackers at Black Hat 2017 were asked about their hacking methods and practices. This is what they said... [Read More]
Fuzzing tests conducted by Synopsys customers show industrial protocols are the least mature and the most risky [Read More]
Vulnerabilities found by a researcher in solar panels may allow hackers to disrupt power grids, but the affected vendor says his claims are greatly exaggerated [Read More]
Enterprising internet users in China fear the tools they use to tunnel through the country's "Great Firewall" may soon disappear, as Beijing tightens its grip on the web. [Read More]
Schneider Electric and industrial cybersecurity startup Claroty have teamed up to offer solutions for securing industrial infrastructure [Read More]
Researchers warn that hackers can abuse GitHub and other Git repo hosting services for stealthy attacks on software developers [Read More]
Cisco patches high severity vulnerabilities in Videoscape Distribution Suite for Television (VDS TV) and Identity Services Engine (ISE) [Read More]
Bitdefender and Checkmarx publish reports describing vulnerabilities they found in popular Neo, VStarcam and Loftek IP cameras [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Erin O’Malley's picture
Can you see into all data across your network? Or does some data remain hidden due to silos between network and security operations teams?
David Holmes's picture
Security researchers found 26 vulnerabilities within ISP network devices that would have given them remote admin access to the majority of home networks in the United States.
Oliver Rochford's picture
Security automation is highly desirable. But this desire has been inhibited by doubt about the accuracy of the detection of threats, and fear of the consequences of automating the containment or mitigation responses.
Jennifer Blatnik's picture
Whether they come from a technical, business or even military background, all CISOs experience a number of personal and professional roadblocks on a daily basis that challenge the ultimate success of their company’s security.
Justin Fier's picture
Every company and organizations is vulnerable to cyber-attacks, and investing in security innovations and gaining total network visibility are more important than ever.
Erin O’Malley's picture
Finding patterns and uncovering clues within network noise requires both broad and granular visibility into traffic (plain-text and encrypted) and is essential for defense against advanced threats.
Alan Cohen's picture
Since VMware introduced the concept of micro-segmentation for data center security, the security and networking industry have been racing to introduce competing technologies to reduce the lateral spread of bad actors in the data center and cloud.
Eddie Garcia's picture
Apache Spot is in its early stages yet it already has all the potential to be the platform where the good guys collaborate, sharing models and algorithms to find the bad actors.
Ken McAlpine's picture
Once you’ve decided that you need to include some SD-WAN capabilities to your network, you should also look at the implications to your security practices.
Ashley Arbuckle's picture
When it comes to automation, most defenders are operating at a deficit. So what’s holding so many enterprises back from incorporating automation in their security programs?