Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Dan Schiappa, VP with Sophos, has published a stinging rebuke against Cylance product comparison methods, saying the Cylance rigged a test by changing disabling default settings in Sophos' product. [Read More]
Cisco releases software updates to patch critical and high severity vulnerabilities in its management and security products [Read More]
A 470 gigabits per second (Gbps) distributed denial of service (DDoS) attack launched earlier this month leveraged nine different payload (packet) types. [Read More]
As it turns out, attackers use standard networking, administration and other tools in most post-intrusion activities, and not malware, a recent report from behavioral attack detection provider LightCyber reveals. [Read More]
Several vulnerabilities, including a critical remote code execution flaw, found in Cisco routers. No patch available [Read More]
AT&T detects approximately 30 billion malicious scans daily on its IP network and sees 400 million spam messages. [Read More]
IoT devices are becoming an increasingly important part of enterprise environments, yet companies continue to fail at securing them properly. [Read More]
IT decision-makers should ask themselves whether a single-vendor strategy is any solution if the resulting deployment is just as complex and resource-intensive as the multi-vendor approach. [Read More]
Netgear releases firmware updates for D3600 and D6000 modem routers to patch two serious vulnerabilities [Read More]
Singapore's prime Minister Lee Hsien Loong has defended the country's controversial decision to cut off civil servants' work computers from the Internet [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Joshua Goldfarb's picture
Analytics is becoming ever more important, and in my opinion, it is an important part of the future of information security.
David Holmes's picture
The portion of encrypted traffic keeps rising, so IT security administrators will be forced to do more SSL decryption if they are to get any value at all out of their fancy security tools.
Wade Williamson's picture
Collecting security data is relatively easy – the value of security analytics solutions will rest in how well they reduce that data into answers.
Ashley Arbuckle's picture
Regardless of what industry you’re in, your ability to successfully compete in the digital economy requires the ability to securely innovate.
Emily Ratliff's picture
The Assimilation Project performs service discovery and inventory of your systems in great detail and stores the resulting data so that it can be queried.
Joshua Goldfarb's picture
The trust between those who run the security organization, and the analysts, incident responders, engineers, and others who do the work on a daily basis is extremely important.
Johnnie Konstantas's picture
When I decided to write a piece on metadata, my first thought was: How can I make this short and sweet, like metadata? My next thought: A haiku!
Alan Cohen's picture
If security can increasingly be distributed into the compute layer—effectively a form of self-protection—we begin to shift the playing field from attacker to defenders.
Ken McAlpine's picture
The emergence of IoT may finally be the technology that brings security from a network afterthought and bolt-on technology to an integral, persistent, omnipresent part of the network.
Avi Chesla's picture
Security technologies must be provisioned with the right policy in order to ensure it complements the neighboring solution, and must also be activated in the right sequence.