Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A new version of OpenVPN was released to address a critical denial-of-service (DoS) vulnerability (CVE-2014-8104) that can be exploited to cause servers to crash.
A reflected cross-site scripting (XSS) vulnerability has been identified in the management interface of the Alcatel-Lucent 1830 Photonic Service Switch.
A10 Networks has launched a new version of its Thunder Threat Protection System (TPS) solution with improvements in programmability, mitigation, detection and visibility.
Attackers managed to Hijack the domain name for Craigslist.org and alter the DNS settings to redirect users to other sites.
NexDefense announced the availability of a new an Industrial Network Anomaly Detection (INAD) system designed to help customers detect and respond to abnormal behavior within their control system environments.
Microsoft reported that some users who have applied patch (MS14-066) to address the Schannel Remote Code Execution Vulnerability (CVE-2014-632) 1are having issues, including a fatal alert related to the TLS protocol.
Security experts share their thoughts on the "Darkhotel" espionage campaign and provide recommendations for executives who travel a lot and don't want sensitive corporate information to end up in the hands of cyber spies.
Hackers believed to have been working from China broke through defenses of the US weather service recently, according to a report.
A study commissioned by Incapsula shows that the cost of a successful DDoS attack is estimated at $40,000 per hour.
Attackers are increasingly leveraging large Domain Name System (DNS) TXT records in an effort to amplify the impact of their distributed denial-of-service (DDoS) attacks.

FEATURES, INSIGHTS // Network Security

rss icon

Scott Gainey's picture
Panic triggers a response that often leads to potentially catastrophic mistakes. Those mistakes come as we grasp for short-term fixes that give us a stronger sense of control, but don’t take long term consequences into account.
Scott Simkin's picture
As more organizations build applications other than Web and corporate email into the course of their business, adversaries are taking note and adjusting their tactics.
Joshua Goldfarb's picture
Because of the large volume of even the highest priority alerts, analysts are not able to successfully review each event. And with a large number of false positives, analysts become desensitized to alerts and do not take them seriously.
Avi Chesla's picture
In order to reap the greatest benefit from virtualization, SDN and NFV concepts, the control and data-plane functions of network security devices should be decoupled.
Pat Calhoun's picture
Adapted firewall VPN technology ensures network efficiency at a fraction of the cost of MPLS acquisition, with failover support to eliminate the pains of packet loss and minimize the impact on the user.
David Holmes's picture
In 2011, Twitter began encrypting all information between the (mostly) mobile endpoints and their own servers. This made it more difficult for monitoring agencies to determine a mobile user’s Twitter profile, and thereby that user’s follow list. More difficult, but not impossible.
Scott Simkin's picture
The network edge is the ideal location for quickly preventing the vast majority of attacks, but looking forward, you should consider how pervasive deployments can stop the new breed of advanced attack.
Marc Solomon's picture
Advancing our security controls isn’t going to happen overnight. But we are well on our way with technology and capabilities that are already headed in this direction, implementing dynamic controls to see more, learn more, and adapt quickly.
Rebecca Lawson's picture
There is a widening gap between detection of a threat and enforcement that causes the threat to stop at the firewall, rather than play out its malicious intent.
Marc Solomon's picture
Thanks to significant technological advances what we can do is use knowledge of the past and the present to drive a desired future outcome. That capability is extremely important for better security given today’s threat landscape and the vicious cycle defenders face.