Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Smart electricity meters continue to pose a serious cybersecurity risk to consumers and utilities. But can hacking lead to explosions? [Read More]
The recently released Joint Analysis Report (JAR) published by the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) to detail tools used by Russian hackers in cyber attacks against the United States election didn’t deliver on its promise, security experts argue. [Read More]
Just before Christmas, Imperva found its network under a massive DDoS assault that reached 650 Gbps (Gigabit per second) making it one of the largest known DDoS attacks. [Read More]
With non-malware attacks, the whole cyber kill chain can be conducted without installing anything or dropping any binary to disk. [Read More]
Vulnerabilities in NETGEAR WNR2000 routers allow an attacker to retrieve the administrator password and take full control of the affected networking device, a security researcher has discovered. [Read More]
Cisco patches actively exploited privilege escalation vulnerability in CloudCenter Orchestrator [Read More]
While most of the security industry is looking forward and making threat predictions for 2017, one vendor has stopped to analyze what has been happening in 2016 -- and the reality is, we aren't even aware of what is happening in our networks today. [Read More]
Researcher discloses potentially serious vulnerabilities found in Panasonic Avionics in-flight entertainment systems [Read More]
The latest power outages in Ukraine may have been caused by a cyberattack, according to the national energy company Ukrenergo [Read More]
Nagios Core affected by privilege escalation and remote code execution vulnerabilities that can be chained for high impact exploit [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Ken McAlpine's picture
Perhaps it’s time to look at Open Security as the next necessary iteration of deploying security technology.
Wade Williamson's picture
A data center will often encounter an attacker at a far more mature phase of attack than the perimeter will, and likewise, will experience different types of threats and attack techniques.
David Holmes's picture
SSL/TLS-encrypted traffic has become so common today that the attack communication with bots now goes undetected by these security solutions.
Erin O’Malley's picture
To understand SIEM, it’s important to first understand when people started to care about network security. And to do that, we need to take a step back in time.
Jennifer Blatnik's picture
Listen to your coach. Similar to the Olympics, a CSO or CISO needs to be able to lead their team and consider the impact they will have on the broader organization.
Nathaniel Gleicher's picture
Cybersecurity defenders face a similar problem to the Secret Service: they are defending high-value assets that must be protected, but also have to speak to hundreds or thousands of other servers.
Jennifer Blatnik's picture
While using containers to secure your organization is a relatively novel approach, it can lead to cost savings and massive scalability.
Ken McAlpine's picture
Once you have an understanding of where your security risks are, you can make better choices about what types and what sources of threat intelligence are most applicable.
Joshua Goldfarb's picture
Analytics is becoming ever more important, and in my opinion, it is an important part of the future of information security.
David Holmes's picture
The portion of encrypted traffic keeps rising, so IT security administrators will be forced to do more SSL decryption if they are to get any value at all out of their fancy security tools.