Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

RSA has made improvements to the ECAT threat detection and remediation tool, and the Via Lifecycle and Governance identity management solution.
Verisign has launched a new cloud-based DNS Firewall designed to offer protection from threats and malware, with the ability for customers to customize filtering based on their organizational needs.
Level 3 Communications has paid an undisclosed cash sum to acquire Black Lotus, a provider of Distributed Denial of Service (DDoS) mitigation services.
Deutsche Telekom has teamed up with Intel Security to develop and deploy honey pots that can be embedded in any device, including smartphones and other connected (IoT) devices.
Cisco said on Tuesday that it would pay roughly $635 million to acquire San Francisco-based OpenDNS
Cisco warned on Thursday that as a result of default encryption keys in three of its security products, customers are at risk of an unauthenticated remote attacker being able intercept traffic or gain access to vulnerable systems with root privileges.
Security startup Menlo Security emerged from stealth armed with $25 million in funding from the closing of a Series B funding round.
Cyphort, a provider of threat detection solutions, has secured $30 million in Series C funding, bringing the total raised by the company to more than $53 million.
Fortinet has agreed to acquire Meru Networks (NASDAQ: MERU), a provider of enterprise wireless networking solutions, for roughly $44 million in cash.
Cybereason, a Cambridge, Mass.-based provider of threat detection solutions, has closed a $25 million Series B funding round, with defense contractor Lockheed Martin participating as a strategic investor.

FEATURES, INSIGHTS // Network Security

rss icon

Alan Cohen's picture
If vaults deep within the building protect banks from bank robbers, why do so many security professionals focus so much attention on their data center’s front door?
Marc Solomon's picture
Accepting the reality that some attacks will get through, security effectiveness must be measured by how quickly we detect a compromise and stop the exploitation of that attack.
Alan Cohen's picture
Many CISOs say that action they undertake in their first six months on the job is to determine the most valuable and most at-risk actions and take steps to mitigate the risk. How can they take those steps while also addressing the catch-22?
David Holmes's picture
As new SSL vulnerabilities surface, we can use our enterprise-specific categorization to decide if it’s going to be a Godzilla day or a Hello Kitty day.
Jason Polancich's picture
In today’s cyber defense world as in other business domains, actions should speak louder than words. Yet, too often, being “actionable” is just that - a word with no meaning.
Alan Cohen's picture
Like other forms of technical debt, security debt must be paid down, which ultimately leads to a more agile and secure enterprise.
Wade Williamson's picture
While malware is obviously a critically important tool in the attacker’s arsenal, it is just one of many that make sophisticated attacks successful.
David Holmes's picture
Whether Shodan's John Matherly intends it to or not, Shodan is already exposing the sham of consumer-grade security that we all suspected would be a hallmark of The Internet of Things.
Rafal Los's picture
Often times it’s the insiders that enable the external attacker – either willingly or otherwise, and the result can be even more devastating than that of an external attacker.
Travis Greene's picture
Can IT security find a way to coexist with wearables faster than the first BYOD war and avoid a second war?