Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

DHS issues binding operational directive requiring all federal agencies to use HTTPS, DMARC and STARTTLS [Read More]
Microsoft patches critical remote code execution flaw in Windows that hackers can exploit without user interaction via malicious DNS responses [Read More]
Intel this week announced the launch of a new offering to help securely automate Internet of Things (IoT) devices and bring them online fast. [Read More]
HPE patches several critical remote code execution vulnerabilities in its Intelligent Management Center (iMC) product [Read More]
NIST has published an update on its work on the new Secure Internet Domain Routing (SIDR) standards designed to provide the internet the security that is currently lacking from the Border Gateway Protocol (BGP). [Read More]
Appthority report reveals which iOS and Android apps are the most blacklisted by security teams [Read More]
Linux distros and tech companies warn customers about the Dnsmasq vulnerabilities discovered by Google [Read More]
Amid an increase in frequency of repeat application layer DDoS attacks during the second quarter of the year, over 75% of targets were hit multiple times, according to statistics from Imperva. [Read More]
Google researchers find seven vulnerabilities, including ones that allow remote code execution, in the Dnsmasq network services software [Read More]
Netgear patches over 50 vulnerabilities in routers, switches, NAS devices and wireless access points [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Ashley Arbuckle's picture
If you’re among the majority taking an architectural approach to consolidate security vendors then remember, your best defense is a good offense.
Jennifer Blatnik's picture
You can slow down a hacker, but it will do you good to accept that you may never be able to truly stop someone from getting through your first line of defense.
Oliver Rochford's picture
To succeed in an era of rapidly evolving threats and emerging technology and the resulting shortfall of actionable evidence and lack of certainty, hypothesizing is the closest we can get to prediction.
Siggi Stefnisson's picture
SSL encryption can create blind spots in many organizations, as malware in the HTTPS channel is essentially hidden from most web security tools.
Alan Cohen's picture
There are different types of segmentation architectures: network centric, hypervisor centers, or distributed. Let’s take a look at each one and review the puts and takes of each approach.
Jennifer Blatnik's picture
Protecting this data is a necessity as more and more consumers are voluntarily offering up their rights to security or privacy in search for convenience.
Ashley Arbuckle's picture
Segmentation is an important element of any security strategy to mitigate risk from IoT-based attacks, but it has to be done right.
Erin O’Malley's picture
Can you see into all data across your network? Or does some data remain hidden due to silos between network and security operations teams?
David Holmes's picture
Security researchers found 26 vulnerabilities within ISP network devices that would have given them remote admin access to the majority of home networks in the United States.
Oliver Rochford's picture
Security automation is highly desirable. But this desire has been inhibited by doubt about the accuracy of the detection of threats, and fear of the consequences of automating the containment or mitigation responses.