Security Experts:

long dotted


Hundreds of Cisco switches are affected by a critical zero-day vulnerability found by the vendor during its analysis of WikiLeaks’ Vault 7 files [Read More]
The US Department of Homeland Security's US-CERT has issued a new alert warning about problems with some HTTPS inspection products. [Read More]
Distributed denial of service (DDoS) attacks continue to grow in size and sophistication, with network layer attacks reaching record levels in the fourth quarter of 2016, Imperva reports. [Read More]
An unpatched command injection vulnerability affecting many Ubiquiti products allows attackers to hack devices [Read More]
Financially motivated attackers have become just as sophisticated as state-sponsored actors, says FireEye in 2017 M-Trends report [Read More]
Several Cisco products are exposed to attacks due to the Apache Struts 2 vulnerability that has been exploited in the wild [Read More]
1 in 5 websites worldwide still use certificates using the SHA-1 cryptographic hash function, according to analysis by security firm Venafi. [Read More]
The latest update for Aruba’s AirWave network management product patches XXE and XSS vulnerabilities [Read More]
Siemens patches XSS and CSRF vulnerabilities in RUGGEDCOM network management system (NMS) [Read More]
Palo Alto Networks on Tuesday announced that it has acquired breach detection firm LightCyber for $105 million in cash. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Scott Simkin's picture
In discussions about cybersecurity, a word that gets used a lot is “prevention.” How do you prevent cyberattacks before they succeed?
Erin O’Malley's picture
Visibility—delivered via a centralized platform—is the only thing that is going to bring order to the kluge that is the modern-day network.
David Holmes's picture
Since Dyn is the major DNS provider for Twitter, Github, and Spotify, the knock-on effects of the massive DDoS attack have had a global reach.
Marie Hattar's picture
Marie Hattar of Ixia looks at the growing armies of botnets, and how their tactics can be nullified using intelligent IP address filtering.
Erin O’Malley's picture
A security delivery platform delivers visibility into lateral movement of attackers, accelerates detection of data theft activity, and can reduce the overhead, complexity, and costs associated with security deployments.
Marie Hattar's picture
By following these best practice techniques, you can ensure that your security architecture maximizes your company’s overall security posture and its efficiency.
David Holmes's picture
SWEET32 is probably not something that an enterprise administrator needs to lose sleep over. Very likely, we will never see a SWEET32 attack in the wild, just as we never have for POODLE or BEAST.
Ken McAlpine's picture
Perhaps it’s time to look at Open Security as the next necessary iteration of deploying security technology.
Wade Williamson's picture
A data center will often encounter an attacker at a far more mature phase of attack than the perimeter will, and likewise, will experience different types of threats and attack techniques.
David Holmes's picture
SSL/TLS-encrypted traffic has become so common today that the attack communication with bots now goes undetected by these security solutions.