Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Security analytics firm Skybox raises $150 million to advance its cybersecurity management product [Read More]
Symantec announces new capabilities in Symantec Endpoint Protection (SEP) and claims it’s leapfrogging the competition [Read More]
Study shows one-third of industrial networks are accessible from the Internet and 10% of OT networks are already infected with malware [Read More]
A new, massive Mirai-linked botnet is recruiting improperly secured IoT devices such as IP wireless cameras [Read More]
Security firm discloses several unpatched vulnerabilities affecting Linksys E-series wireless routers [Read More]
Cisco patches critical vulnerability in Cloud Services Platform. Flaws also addressed in small business IP phones and other products [Read More]
IT security professionals, particularly executives, admit snooping on the corporate network, One Identity study shows [Read More]
Technology companies worldwide have released or are working on releasing patches to address the dangerous Wi-Fi vulnerabilities publicly disclosed on Monday. [Read More]
DHS issues binding operational directive requiring all federal agencies to use HTTPS, DMARC and STARTTLS [Read More]
Microsoft patches critical remote code execution flaw in Windows that hackers can exploit without user interaction via malicious DNS responses [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Erin O’Malley's picture
Finding patterns and uncovering clues within network noise requires both broad and granular visibility into traffic (plain-text and encrypted) and is essential for defense against advanced threats.
Alan Cohen's picture
Since VMware introduced the concept of micro-segmentation for data center security, the security and networking industry have been racing to introduce competing technologies to reduce the lateral spread of bad actors in the data center and cloud.
Eddie Garcia's picture
Apache Spot is in its early stages yet it already has all the potential to be the platform where the good guys collaborate, sharing models and algorithms to find the bad actors.
Ken McAlpine's picture
Once you’ve decided that you need to include some SD-WAN capabilities to your network, you should also look at the implications to your security practices.
Ashley Arbuckle's picture
When it comes to automation, most defenders are operating at a deficit. So what’s holding so many enterprises back from incorporating automation in their security programs?
Preston Hogue's picture
Defenders need a new type of counterinsurgent security that can move out into the jungle to protect users and sensitive data against attackers who disguise their exploits with the very encryption that we think keeps us safe.
Marie Hattar's picture
Understanding how well (or not) websites and networks deal with the unexpected spikes in inbound traffic is the first step in dealing with DDoS attacks.
Avi Chesla's picture
At the end of the day, CISOs are finding it very challenging to be able to assess the performance of the security products in their organization’s arsenal.
Jennifer Blatnik's picture
While automation delivers many benefits to the enterprise, there are dangers to mindlessly automating every business function, especially when it comes to security.
Marie Hattar's picture
Full visibility is necessary when it comes to security, but some things should stay hidden. How do we see the whole network? What tools do we need? How do we stay compliant?