Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

CrowdStrike has launched a new threat intelligence exchange platform that facilitates the access and exchange of threat intelligence between vendor partners.
A flaw in mGuard series industrial security routers from Innominate Security Technologies could be exploited remotely by an unauthenticated attacker to obtain configuration information.
Cisco has expanded its certification portfolio to include specialists in industrial networking and other fields.
A new report examines the impact on the Internet itself and the ways in which the NSA has both weakened overall trust in the network and directly harmed the security of the Internet.
Qualys, a provider of cloud-based security and compliance solutions, announced enhancements to its cloud service Qualys Continuous Monitoring (CM) solution this week.
Cloud services provided by Amazon Web Services and other companies are being abused by profit-driven cybercriminals to host DDoS bots, Kaspersky Lab reported on Friday.
Information security specialists at the Georgia Tech Research Institute have developed BlackForest, a new open source intelligence gathering system.
Waterfall Security Solutions has teamed with energy management solutions maker Schneider Electric to offer Waterfall’s Unidirectional Security Gateways to Schneider’s customers.
LogRhythm has raised a $40 million round of new equity financing, the company announced.
The Splunk App for Enterprise Security 3.1 has introduced a new risk scoring framework to enable easier, faster threat detection and containment by empowering users to assign risk scores to any data.

FEATURES, INSIGHTS // Network Security

rss icon

Marc Solomon's picture
Organizations need to look at their security model holistically and gain continuous protection and visibility along the entire journey – from point of entry, through propagation, and post-infection remediation.
Tal Be'ery's picture
Defenders should use their "Strategic Depth" to mitigate attacks not on the perimeter but deeper within their network where they can leverage on their strategic advantage.
Torsten George's picture
In order to find the needle in the haystack, it is imperative to have all necessary data available to diagnose the patterns that point to an advanced persistent threat or sophisticated cyber-attack.
Joshua Goldfarb's picture
Understanding the challenges of information sharing up front can help organizations learn from the mistakes of others and build a more successful information sharing program.
Marc Solomon's picture
Data center administrators need technologies that allow them to be as ‘centered’ on security as attackers are on the data center.
Danelle Au's picture
The protection of connected ( Internet of Things) devices is likely better performed at a network level rather than an endpoint level due to the variety of devices that may exist and the limited endpoint security functions that can be supported.
Aviv Raff's picture
Automated traffic log analysis can help enterprises reduce the number of infections, including those that they do not know about, yet are unfolding in their networks right now.
Joshua Goldfarb's picture
When performing incident response, an organization should proceed through various stages by following its incident response process. While all stages are important, when an enterprise is attacked, the highest priority quickly becomes moving rapidly from detection to containment.
Wade Williamson's picture
While free tools aren’t the answer for every problem, they probably should be a part of your security toolkit. Even better, they can provide an easy way to learn about new security technologies and provide your team with hands-on experience.
Chris Coleman's picture
The shaping of the threat intelligence management market is critical to its success, and there is much confusion about the very term “threat intelligence.” I am a firm believer that intelligence is a process, not an individual thing, and that Intelligence is not “done.” It is “created.”