Security Experts:

long dotted


A plan to give control of the Internet's technical operations to a diverse range of groups, including governments and businesses, instead allowing the state sole power, is gathering international support.
Beijing is "seriously concerned" about reports that the US had compromised Huawei's networks, Chinese foreign ministry spokesman Hong Lei told reporters at a regular briefing.
Palo Alto Networks announced on that it would acquire privately held security startup Cyvera for roughly $200 million.
Stakeholders met in Singapore to discuss the future of the Internet after the US said it will hand over stewardship of its technical operations to a global group including businesses and governments.
The US National Security Agency has secretly tapped into the networks of Chinese telecom and internet giant Huawei, according to reports.
Palo Alto Networks has opened a new cybersecurity solutions lab at the company’s new regional headquarters in Singapore.
Damballa Failsafe is now integrated with ForeScout CounterACT, enabling customers to automatically quarantine or log devices deemed ‘infected’ by Damballa.
Imperva issued a threat advisory for a code injection vulnerability in PHP (CVE-2012-1823).
Juniper Networks and Verisign have joined forces to provide a hybrid DDoS mitigation service that combines Juniper’s on premise DDoS Secure technology with Verisign’s Cloud-Based DDoS mitigation service.
Sophos has made several updates to its Unified Threat Management solution in an effort to bring Advanced Threat Protection (ATP) to the small and mid market.

FEATURES, INSIGHTS // Network Security

rss icon

Mark Hatton's picture
One of my concerns heading into these Olympic Games is that the public has become somewhat desensitized to cyber-attacks and we may not have the same level of vigilance against cyber threats as we should.
Danelle Au's picture
Zero Trust advocates for a segmented network, and security built into the architecture rather than an afterthought. It also advocates for some key principles built around the concept of “never trust, always verify”.
Michael Callahan's picture
The threats that companies face will continue to accelerate. And while that might seem like a very obvious and not so insightful observation, the devil is in the details. Here are the trends both in the threats and how we will respond to them in 2014.
Avi Chesla's picture
What’s missing today is a well-defined set of selection criteria for attack mitigation solutions, mainly for the online business market. Four types of attack mitigation solutions exist in today’s market. In regard to quality of attack mitigation, each one has its own characteristics.
Jeff Hudson's picture
Making decisions based on anomalies is predicated by one very important assumption—you must understand what “normal” looks like.
Mark Hatton's picture
Complacency is never a good thing, but in security it can have devastating effects. While it’s good to acknowledge progress, that should never stand in the way of staying ahead of the next potential threat.
Marc Solomon's picture
With a security approach that incorporates automation, integration and education, control isn’t a pipe dream but a reality that is achievable and necessary to detect, understand and stop threats.
Chris Coleman's picture
The events that occurred in 2013 will forever be reflected in the Internet DNA of the future, and how the cyber security market evolves to accommodate that future.
Dr. Mike Lloyd's picture
Security, like every other arena, can benefit from taking a step back to consider what we’ve done, where we’re going, and what we should try to do differently.
Marc Solomon's picture
As threats and our IT environments have become increasingly sophisticated, they’ve collided with traditional security methods that have not followed suit. Is it possible to simplify security yet increase its ‘sophistication’?