Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Cisco patches critical vulnerability in Cloud Services Platform. Flaws also addressed in small business IP phones and other products [Read More]
IT security professionals, particularly executives, admit snooping on the corporate network, One Identity study shows [Read More]
Technology companies worldwide have released or are working on releasing patches to address the dangerous Wi-Fi vulnerabilities publicly disclosed on Monday. [Read More]
DHS issues binding operational directive requiring all federal agencies to use HTTPS, DMARC and STARTTLS [Read More]
Microsoft patches critical remote code execution flaw in Windows that hackers can exploit without user interaction via malicious DNS responses [Read More]
Intel this week announced the launch of a new offering to help securely automate Internet of Things (IoT) devices and bring them online fast. [Read More]
HPE patches several critical remote code execution vulnerabilities in its Intelligent Management Center (iMC) product [Read More]
NIST has published an update on its work on the new Secure Internet Domain Routing (SIDR) standards designed to provide the internet the security that is currently lacking from the Border Gateway Protocol (BGP). [Read More]
Appthority report reveals which iOS and Android apps are the most blacklisted by security teams [Read More]
Linux distros and tech companies warn customers about the Dnsmasq vulnerabilities discovered by Google [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Jennifer Blatnik's picture
Protecting this data is a necessity as more and more consumers are voluntarily offering up their rights to security or privacy in search for convenience.
Ashley Arbuckle's picture
Segmentation is an important element of any security strategy to mitigate risk from IoT-based attacks, but it has to be done right.
Erin O’Malley's picture
Can you see into all data across your network? Or does some data remain hidden due to silos between network and security operations teams?
David Holmes's picture
Security researchers found 26 vulnerabilities within ISP network devices that would have given them remote admin access to the majority of home networks in the United States.
Oliver Rochford's picture
Security automation is highly desirable. But this desire has been inhibited by doubt about the accuracy of the detection of threats, and fear of the consequences of automating the containment or mitigation responses.
Jennifer Blatnik's picture
Whether they come from a technical, business or even military background, all CISOs experience a number of personal and professional roadblocks on a daily basis that challenge the ultimate success of their company’s security.
Justin Fier's picture
Every company and organizations is vulnerable to cyber-attacks, and investing in security innovations and gaining total network visibility are more important than ever.
Erin O’Malley's picture
Finding patterns and uncovering clues within network noise requires both broad and granular visibility into traffic (plain-text and encrypted) and is essential for defense against advanced threats.
Alan Cohen's picture
Since VMware introduced the concept of micro-segmentation for data center security, the security and networking industry have been racing to introduce competing technologies to reduce the lateral spread of bad actors in the data center and cloud.
Eddie Garcia's picture
Apache Spot is in its early stages yet it already has all the potential to be the platform where the good guys collaborate, sharing models and algorithms to find the bad actors.