Security Experts:

long dotted


Hackers breached the systems of anti-adblocking service PageFair and used the access to deliver malware
HP has agreed to sell its HP TippingPoint network security line of products to Trend Micro for roughly $300 million, the two companies announced on Wednesday.
Cybereason, a Cambridge, Mass.-based provider of threat detection solutions, has closed a $59 million Series C funding led by SoftBank.
Akamai said a botnet using the XOR DDoS Trojan is now capable of launching 150+ gigabit-per-second (Gbps) DDoS attacks.
Join SecurityWeek and Zscaler for a compelling webcast full of key insights and findings from an assessment of both integrated security platforms and cloud computing/software-as-a-service (SaaS)-based delivery models.
Splunk released Splunk Enterprise Security 4.0 (formerly Splunk App for Enterprise Security) and Splunk User Behavior Analytics (UBA) security solutions.
HP this week announced the roll-out of new enterprise-grade LaserJet printers and multi-functional printers fitted with additional security features designed to prevent malicious attacks from breaching a company’s network.
Networking equipment provider D-Link accidentally published a series of private code signing keys when releasing the source code of recent firmware updates under the GPL license.
Attackers are modifying the firmware on Cisco routers to breach enterprise networks. Mandiant has spotted 14 compromised routers across four countries.
NETGEAR has released a firmware update to address a vulnerability in its WMS5316 ProSafe 16AP Wireless Management System that could result in authentication bypass and privilege escalation.

FEATURES, INSIGHTS // Network Security

rss icon

Marc Solomon's picture
The Internet of Everything is transforming our world and creating more opportunities for attackers as modern networks and their components constantly evolve and spawn new attack vectors.
Wade Williamson's picture
It has become very clear that intrusion detection and intrusion prevention are not simply deployment options of the same technology. They are in fact separate disciplines with unique requirements, goals and roles in the security stack.
David Holmes's picture
Perhaps the uptick in the adoption of HSTS among the world’s busiest sites foreshadows a broader adoption of this handy security technique.
Alan Cohen's picture
While IT security’s role has been a separate party to manage risk and compliance, does starting security oversight outside the continuous delivery process increase risk or lower it?
Marc Solomon's picture
Retailers must adopt a threat-centric approach to security with protection along the full attack continuum – before, during, and after an attack.
Scott Simkin's picture
When vendors and individuals attempt to keep threat intelligence private, they limit the ability of the entire group to identify and mitigate new threats as they are developed and launched against organizations.
David Holmes's picture
If LE succeeds, it might influence the rest of the CA industry to get its act together. It might drive many of the slightly sketchy bargain CA companies out of the market.
Torsten George's picture
IoT opens up companies all over the world to more security threats, and only time will tell if the IoT vendor community can come together to create a common security framework that helps shrink the security risk iceberg and minimize the risk of cyber-attacks.
Alan Cohen's picture
Insecurity of any time stems from a common psychological cause -- fear. Fear is generally a reaction to something immediate that threatens your security or safety. Fear itself can harm one’s judgment and prevent teams from taking action.
Rafal Los's picture
These two key pieces of data from your network infrastructure are invaluable to your security analysis - yet you likely don’t ever look at it, you most certainly don't have access to it and you probably wouldn't be able to make sense of it if you had it.