Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Application networking solutions provider A10 Networks has added distributed denial-of-service (DDoS) protection to its Thunder CGN (Carrier Grade Networking) products, and has introduced a new product family that leverages the company's Security and Policy Engine (SPE).
A Senate committee approved the Cybersecurity Information Sharing Act, which aims to help companies and government share information about cyber-attacks and other threats. Privacy groups opposed the bill because it could potentially give the government access to huge trove of personal data about Americans.
OpenDNS has enhanced its cloud-based network security service Umbrella with new capabilities designed to protect organizations against targeted attacks.
FireEye Operating System (FEOS) updates that address a series of security vulnerabilities have been released for several products.
Rogue digital certificates issued in India for several Google domains were identified and blocked last week, Google representatives said.
A group operating under the name Tunisian Hackers Team are targeting the websites of government agencies and large organizations with distributed denial of service (DDoS) attacks, according to a threat advisory.
Please join Palo Alto Networks and SecurityWeek on Wednesday, July 9th at 1:00 PM ET for an informative webcast on how your organization can better detect and prevent advanced cyber attacks.
A remote attacker could log into NETGEAR GS108PE ProSAFE Plus Switches and execute arbitrary code because of hardcoded credentials installed within the firmware used on the devices.
Barracuda Networks announced the immediate availability of Barracuda Firewall version 6.5, the latest release of its next-generation firewall designed for the mid-market.
Unified security management solutions provider AlienVault has updated its Open Threat Exchange (OTX), the company's open, crowdsourced threat intelligence sharing system.

FEATURES, INSIGHTS // Network Security

rss icon

Marc Solomon's picture
Data center administrators need technologies that allow them to be as ‘centered’ on security as attackers are on the data center.
Danelle Au's picture
The protection of connected ( Internet of Things) devices is likely better performed at a network level rather than an endpoint level due to the variety of devices that may exist and the limited endpoint security functions that can be supported.
Aviv Raff's picture
Automated traffic log analysis can help enterprises reduce the number of infections, including those that they do not know about, yet are unfolding in their networks right now.
Joshua Goldfarb's picture
When performing incident response, an organization should proceed through various stages by following its incident response process. While all stages are important, when an enterprise is attacked, the highest priority quickly becomes moving rapidly from detection to containment.
Wade Williamson's picture
While free tools aren’t the answer for every problem, they probably should be a part of your security toolkit. Even better, they can provide an easy way to learn about new security technologies and provide your team with hands-on experience.
Chris Coleman's picture
The shaping of the threat intelligence management market is critical to its success, and there is much confusion about the very term “threat intelligence.” I am a firm believer that intelligence is a process, not an individual thing, and that Intelligence is not “done.” It is “created.”
Nimmy Reichenberg's picture
Security practitioners have long had a love-hate relationship with automation, and for good reason.
Torsten George's picture
A threat is the agent that takes advantage of a vulnerability. This relationship must be a key factor in the risk assessment process and can no longer be treated as risk’s neglected step child.
Wade Williamson's picture
As enterprises become increasingly focused on security, it’s important to take an honest look not just at what security measures are in place, but how they are really used.
Marcus Ranum's picture
When you start your metrics program, you'll find that a great deal of information can be gleaned from existing data that gets stored in various places – most likely in your system logs.