Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A fully automated SQLi vulnerability scanner is available for purchase on a hacking forum at only $500, Recorded Future security researchers have discovered. [Read More]
Cisco fixes several vulnerabilities in its Ultra Services Framework and Elastic Services Controller products [Read More]
An unpatched vulnerability affecting Humax WiFi Router model HG-100R allows attackers to compromise the WiFi credentials and even retrieve the router console administrative password. [Read More]
WikiLeaks details OutlawCountry, a tool used by the CIA to redirect traffic from Linux systems [Read More]
Industry professionals comment on the destructive attacks involving the wiper malware known as Petya.A, Petrwrap, NotPetya, exPetr and GoldenEye [Read More]
Cisco warns customers of high severity remote code execution vulnerabilities affecting its IOS software. No patch available yet [Read More]
Authentication bypass vulnerability related to the TSIG protocol patched in BIND and Knot DNS [Read More]
An analysis of the Alexa top 1 million websites with Mozilla Observatory showed significant improvements in the use of modern security technologies [Read More]
Kaspersky patches several vulnerabilities, including ones that allow code execution, in its Anti-Virus for Linux File Server product [Read More]
Akamai launches new product designed to protect enterprises against malware, phishing and data exfiltration attempts by analyzing DNS requests [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Jennifer Blatnik's picture
Focusing on securing an endless amount of endpoints is almost impossible to do effectively. You can’t rely on the devices to be secure and you can’t rely on the consumers to secure their devices themselves.
Alan Cohen's picture
While there are clear security benefits gained through network segmentation, the principal goal of creating subnets is to improve performance, avoiding broadcast storms and latency stimulated by our insatiable requirement for bandwidth.
Rafal Los's picture
Do you ever find yourself trying to protect your organization from exotic attack scenarios that are highly unlikely or that would have a minimal impact on you?
Lance Cottrell's picture
When properly integrated, detection, response, and prevention reinforce each other, each making the other more effective.
Torsten George's picture
While machine learning can help reduce time-to-remediation, will it ever be able to autonomously protect organizations against cyber-attacks?
Avi Chesla's picture
Our cybersecurity ecosystem needs to be simplified – this is a fundamental challenge that the industry has avoided talking about. This need for simplification is what lies at the core of “Security Abstraction “
Alan Cohen's picture
Organizations of any size can do one important thing to help address this challenge: better segment their interior networks and data center operations.
Marie Hattar's picture
Monitoring and securing modern network flows requires granular insight, only possible through sophisticated and automated analytics and security tools.
Marc Solomon's picture
Intelligence-driven security starts with changing how we collect and manage the millions of points of threat data that analysts are bombarded with every day.
Ashley Arbuckle's picture
By aligning your segmentation strategy to business objectives you can respond quickly to the needs of the business while reducing risk and protecting data and applications.