Security Experts:

long dotted


Samsung has released an update for its SW Update Tool that resolves a man-in-the-middle (MiTM) vulnerability affecting Windows-based laptops. [Read More]
One week after the high severity "DROWN" TLS/SSL vulnerability was discovered, 620 out of 653 cloud services were found to be still vulnerable to compromise, according to a scan. [Read More]
Cisco releases software updates to patch high severity vulnerabilities in cable modems, residential gateways, and security appliances [Read More]
Trend Micro has completed its $300 million acquisition of TippingPoint network security products from from Hewlett Packard Enterprise (HPE). [Read More]
Free and open Certificate Authority (CA) Let’s Encrypt announced this week that it has issued more than 1 million certificates since issuing its first Digital Certificate last year. [Read More]
Barracuda has launched a new NextGen Firewall product designed to help organizations securely connect thousands of endpoints [Read More]
Cisco releases software updates to address critical and high severity vulnerabilities affecting the company’s NX-OS network operating system [Read More]
Kaspersky Anti Targeted Attack Platform, the system monitors network, web and e-mail activity to help detect attacks at any stage, even if no malicious activity has occurred. [Read More]
Windows Defender Advanced Threat Protection was designed to offer details on who performed an attack, what assets were breached, and why the attack happened. [Read More]
Qualys ThreatPROTECT gathers and correlates data from vulnerability scans and threat feeds to give organizations a view of their potential exposure to threats. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Marc Solomon's picture
As security vendors, it is incumbent upon us to reduce complexity. By resolving to make advances in these three areas, we can reduce security complexity while helping more organizations thwart more attacks.
Alan Cohen's picture
It is both naïve and wrong to ignore the role infrastructure plays in protecting data. Trusted networks trump untrusted networks. However, should security be a reason to upgrade networks or stay with proprietary compute architectures?
Marc Solomon's picture
With increased awareness and a deeper understanding of how attackers go about their ‘shopping’ we can take some relatively simple baseline measures that can go a long way toward protecting against cybercrime this time of year.
Johnnie Konstantas's picture
While complex threats are an easy place to lay blame, lack of visibility is the real culprit. Turning your eyes inward to detect where compromises occurred sooner rather than later has the potential to limit your risks substantially.
Marc Solomon's picture
The Internet of Everything is transforming our world and creating more opportunities for attackers as modern networks and their components constantly evolve and spawn new attack vectors.
Wade Williamson's picture
It has become very clear that intrusion detection and intrusion prevention are not simply deployment options of the same technology. They are in fact separate disciplines with unique requirements, goals and roles in the security stack.
David Holmes's picture
Perhaps the uptick in the adoption of HSTS among the world’s busiest sites foreshadows a broader adoption of this handy security technique.
Alan Cohen's picture
While IT security’s role has been a separate party to manage risk and compliance, does starting security oversight outside the continuous delivery process increase risk or lower it?
Marc Solomon's picture
Retailers must adopt a threat-centric approach to security with protection along the full attack continuum – before, during, and after an attack.
Scott Simkin's picture
When vendors and individuals attempt to keep threat intelligence private, they limit the ability of the entire group to identify and mitigate new threats as they are developed and launched against organizations.