Security Experts:

long dotted


Open certificate authority (CA) Let's Encrypt has entered public beta, making it even easier for websites to adopt the HTTPS encryption that the organization has been promoting since its inception. [Read More]
Serious vulnerabilities found in the latest firmware version of Belkin N150 wireless routers, and no patches are available [Read More]
Cisco has published a list of products that expose users to MitM attacks due to the reuse of certificates and keys [Read More]
Nmap Security Scanner 7.0.0 has been released. The latest version brings faster scans, a major NSE expansion and other significant improvements. [Read More]
An “onion-layered” cyber security incident is one in which a second, often significantly more damaging attack is uncovered during the investigation of another more visible event. [Read More]
Tenable Network Security, makers of vulnerability scanners and software solutions that helps find network security gaps has raised $250 million in a massive Series B funding round. [Read More]
Geneva-based encrypted email service ProtonMail has been offline for most of the past two days after being targeted by what the company is calling an “extremely powerful DDoS attack.” [Read More]
DDoS attacks from Linux-based botnets accounted for 45.6 percent of the total DDoS attacks in Q3 2015, with most notable being the XOR DDoS botnet, [Read More]
Hackers breached the systems of anti-adblocking service PageFair and used the access to deliver malware [Read More]
HP has agreed to sell its HP TippingPoint network security line of products to Trend Micro for roughly $300 million, the two companies announced on Wednesday. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Jason Polancich's picture
it seems most just don’t see that cyber intelligence needs to become a prioritized, resourced part of what they’re already doing.
Alan Cohen's picture
If vaults deep within the building protect banks from bank robbers, why do so many security professionals focus so much attention on their data center’s front door?
Marc Solomon's picture
Accepting the reality that some attacks will get through, security effectiveness must be measured by how quickly we detect a compromise and stop the exploitation of that attack.
Alan Cohen's picture
Many CISOs say that action they undertake in their first six months on the job is to determine the most valuable and most at-risk actions and take steps to mitigate the risk. How can they take those steps while also addressing the catch-22?
David Holmes's picture
As new SSL vulnerabilities surface, we can use our enterprise-specific categorization to decide if it’s going to be a Godzilla day or a Hello Kitty day.
Jason Polancich's picture
In today’s cyber defense world as in other business domains, actions should speak louder than words. Yet, too often, being “actionable” is just that - a word with no meaning.
Alan Cohen's picture
Like other forms of technical debt, security debt must be paid down, which ultimately leads to a more agile and secure enterprise.
Wade Williamson's picture
While malware is obviously a critically important tool in the attacker’s arsenal, it is just one of many that make sophisticated attacks successful.
David Holmes's picture
Whether Shodan's John Matherly intends it to or not, Shodan is already exposing the sham of consumer-grade security that we all suspected would be a hallmark of The Internet of Things.
Rafal Los's picture
Often times it’s the insiders that enable the external attacker – either willingly or otherwise, and the result can be even more devastating than that of an external attacker.