Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Radware, a provider of application delivery DDoS attack protection solutions, this week unveiled its latest attack mitigation platform designed to help carriers and cloud providers protect against high volume DDoS attacks.
Mozilla will introduce OneCRL to streamline the certificate revocation process. The feature will be available starting with Firefox 37.
Researchers uncovered vulnerability that enables attackers to decrypt HTTPS-protected traffic.
Network security firm Palo Alto Networks (NYSE: PANW) announced that total revenue for the fiscal second quarter ended January 31, 2015 grew 54 percent year-over-year to a record $217.7 million
Lookingglass Cyber Solutions, an Arlington, VA-based provider of threat intelligence solutions, announced on Monday that it has acquired Deep Packet Processing (DPP) platform provider CloudShield, for an undisclosed amount.
Attackers are using Windows Management Instrumentation (WMI) and PowerShell to avoid detection and carry out broad commands on compromised systems, according to FireEye-owned Mandiant.
Avast has launched a free, cloud-managed solution dedicated to small and medium businesses (SMBs) with limited budgets and resources.
Check Point Software Technologies has acquired Hyperwise, a privately held, security startup focused on CPU-level threat prevention technology.
Japan's National Institute of Information and Communications Technology (NICT), which has a network of a quarter of a million sensors, said there were 25.66 billion attempts to compromise systems, according to a report.
The developers of the advanced purely-functional programming language Haskell are investigating a data breach identified by the organization’s hosting provider.

FEATURES, INSIGHTS // Network Security

rss icon

Avi Chesla's picture
Now more than ever, context-based decisions have become a necessity. This is because the identification process of an advanced persistent attack campaign is all about putting events in the right context.
Wade Williamson's picture
By establishing an enterprise-wide context focused on key assets and user behaviors, organizations can build a unified security framework that encompasses all locations and all of their assets.
Rafal Los's picture
As long as the “hikers and bear” analogy is told in boardrooms we will have difficulty communicating the value of a proportionate security model where we design security measures for different types of adversaries with different types of objectives.
David Holmes's picture
Normally you wouldn’t think something as mundane as farming equipment could incite a lot of cyber malice, right? But that’s exactly what happened.
Joshua Goldfarb's picture
Although home is where the heart is, it’s important to remember not to devote the overwhelming percentage of security resources to your home geographic area if that’s not where the overwhelming amount of your business and its assets are located.
Avi Chesla's picture
When security technologies are bypassed, they cannot be “programmed” to detect and prevent the new attack behavior, the same attack that has breached their protection-space borders.  
David Holmes's picture
If Let’s Encrypt succeeds, will self-signed certificates go extinct? I’m guessing no, and that’s not necessarily a bad thing.
Pat Calhoun's picture
To evade network security defenses, Advanced evasion techniques (AETs) disguise malicious payloads by splitting them into smaller pieces and then delivering the pieces simultaneously, or at varying times, across multiple or rarely used network protocols.
Jason Polancich's picture
Most businesses today are not as secure as they could be due to an inaccurate view of their own cyberdefenses.
Rebecca Lawson's picture
As companies deploy new security technologies, understanding the impact on overall network performance should be a very important factor in the decision-making process.