Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Zscaler launched a new cloud-based next-generation firewall that provides network security, application control and visibility from any location, with no on-premise hardware or software required.
Security research and product-testing firm NSS Labs announced today it has secured $7 Million in additional equity and debt funding.
AlienVault launches Open Threat Exchange (OTX) 2.0 Beta. The security startup has redesigned its threat exchange platform and opened access to the entire security community.
Norse introduced a new intelligence service that leverages a combination of automated and human threat monitoring and analysis to help enterprise security teams detect compromised systems and malicious activity.
FireMon has acquired Immediate Insight to improve real-time security event analysis.
Let's Encrypt takes the world a step closer to a time when more websites would use a certificate and TLS would be the default across the Web, rather than the present where most sites do not even have a valid certificate
As we mark the one-year anniversary of disclosure of the now famous OpenSSL vulnerability known as Heartbleed, security firm Venafi has released new research that shows how vulnerable Global 2000 organizations still are as a result of the flaw.
Endgame, Inc. announced the launch of its enterprise endpoint detection and response platform, Endgame Enterprise.
Norse Corp. has launched a new version of its threat intelligence appliance which can actively monitor inbound and outbound network traffic at up to 10 gigabits-per-second.
Google let a digital certificate expire that was sed to secure its smtp.google.com domain, the domain used by Gmail and Google Apps users to send outgoing email.

FEATURES, INSIGHTS // Network Security

rss icon

Joshua Goldfarb's picture
Life is full of distractions, and the information security profession is not immune to them. Security professionals have an obligation to remain focused on building, maturing, and improving our security programs and security postures.
Marc Solomon's picture
By embedding security everywhere across the extended network, not only does security become more effective against advanced attacks, it also becomes a business enabler.
David Holmes's picture
After the rounds of predictions for 2014, I had bet my colleague that if no mobile DDoS appeared this year, we’d stop talking about it. And it looks like we can.
Joshua Goldfarb's picture
The question of build or buy is not a new one, but it is one that does not adequately suit the implementation of a security solution.
Wade Williamson's picture
Network administrators have to remember that they are not just the protectors of the organization – they are also the most valuable targets.
Scott Gainey's picture
As security professionals, we need to approach shadow IT with a pragmatic view – how can we better support the business’ needs while keeping risk in check.
Jason Polancich's picture
In reality, the beauty of threat intelligence is much more than skin deep. Open source data is just a small part of the threat intelligence picture.
Marc Solomon's picture
To reduce time to detection and time to resolution, threat intelligence must be tactical, contextual, automated, and easily shared.
Travis Greene's picture
The recent development of the democratization of Machine Learning is an indication that it’s time to consider adding it to our security arsenal, as it offers an opportunity to more dynamically measure risk.
Rafal Los's picture
As a potential buyer and consumer of security solutions, how do you know what technologies, products and services will address your needs?