Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

CloudFlare has launched Universal SSL, a feature where CloudFlare will automatically provision a SSL certificate on its network that will accept HTTPS connections for customers' domains and subdomains.
Cloud security startup FireLayers has launched a new solution designed to enable enterprises to securely use cloud-based applications.
Akamai Technologies has published a new threat advisory to warn enterprises of distributed denial-of-service (DDoS) attacks leveraging a toolkit dubbed "Spike."
According to a DDoS attack trend report report released Sept. 23, a majority of attacks analyzed (more than 90%) lasted less than 30 minutes, but were repeated frequently.
CloudFlare's Keyless SSL innovation allows customers to take advantage of the company's solutions without ever having to hand over their private SSL keys.
FireEye has announced new offerings designed to provide customers with on-demand access to its cyber defense technology, intelligence, and analysts expertise on a subscription basis.
JPMorgan Chase, one of the largest banks in the United States, has confirmed that its systems were breached this summer.
The NSA and British intelligence services are able to secretly access data from telecoms giant Deutsche Telekom and several other German operators, according to Der Spiegel weekly.
LightCyber, a provider of security breach detection and response solutions, has raised $10 million in a new funding round led by Battery Ventures.
Following the discovery of Heartbleed, the OpenSSL Project has created a new security policy and patched a total of 16 vulnerabilities in the open source library.

FEATURES, INSIGHTS // Network Security

rss icon

Jason Polancich's picture
Studying a problem from every angle and every level always leads to more practical solutions and quicker (re)action.
Aviv Raff's picture
While the phrase “cyber kill chain” is embedded in the cyber security vocabulary, many enterprises are still not proactive about keeping their assets, data, and reputations safe from bad actors.
Joshua Goldfarb's picture
Conceptually, integrating actionable intelligence is a logical endeavor, though it does contain details requiring specialized skills and technical knowledge. If you can better collect, vet, retain, and leverage intelligence, it will serve you well in the long run!
Scott Simkin's picture
While SSL decryption is necessary for maintaining network security, security admins need to establish strict rules about how they handle decrypted data.
Marc Solomon's picture
Organizations need to look at their security model holistically and gain continuous protection and visibility along the entire journey – from point of entry, through propagation, and post-infection remediation.
Tal Be'ery's picture
Defenders should use their "Strategic Depth" to mitigate attacks not on the perimeter but deeper within their network where they can leverage on their strategic advantage.
Torsten George's picture
In order to find the needle in the haystack, it is imperative to have all necessary data available to diagnose the patterns that point to an advanced persistent threat or sophisticated cyber-attack.
Joshua Goldfarb's picture
Understanding the challenges of information sharing up front can help organizations learn from the mistakes of others and build a more successful information sharing program.
Marc Solomon's picture
Data center administrators need technologies that allow them to be as ‘centered’ on security as attackers are on the data center.
Danelle Au's picture
The protection of connected ( Internet of Things) devices is likely better performed at a network level rather than an endpoint level due to the variety of devices that may exist and the limited endpoint security functions that can be supported.