Security Experts:

long dotted


Damballa Failsafe is now integrated with ForeScout CounterACT, enabling customers to automatically quarantine or log devices deemed ‘infected’ by Damballa.
Imperva issued a threat advisory for a code injection vulnerability in PHP (CVE-2012-1823).
Juniper Networks and Verisign have joined forces to provide a hybrid DDoS mitigation service that combines Juniper’s on premise DDoS Secure technology with Verisign’s Cloud-Based DDoS mitigation service.
Sophos has made several updates to its Unified Threat Management solution in an effort to bring Advanced Threat Protection (ATP) to the small and mid market.
HITRUST will conduct monthly cyber threat briefings in partnership with the U.S. Department of Health and Human Services and notify healthcare organizations about high probability and impact cyber threats targeted at the healthcare industry.
Prolexic Technologies and Arbor Networks both issued warnings to organizations about the increased threat of NTP amplification DDoS attacks.
Fortinet has launched four new DDoS protection appliances designed for mid to large-sized enterprises and managed service providers (MSPs).
FireEye has released its 2013 Advanced Threat Report (ATR), which provides a high-level overview of attacks that the company discovered last year.
At the RSA Conference, a researcher discusses how common configuration issues can enable an attacker to wreak havoc in the data center.
Qualys has added Continuous Monitoring to its flagship QualysGuard suite of applications for security and compliance.

FEATURES, INSIGHTS // Network Security

rss icon

Mark Hatton's picture
One of my concerns heading into these Olympic Games is that the public has become somewhat desensitized to cyber-attacks and we may not have the same level of vigilance against cyber threats as we should.
Danelle Au's picture
Zero Trust advocates for a segmented network, and security built into the architecture rather than an afterthought. It also advocates for some key principles built around the concept of “never trust, always verify”.
Michael Callahan's picture
The threats that companies face will continue to accelerate. And while that might seem like a very obvious and not so insightful observation, the devil is in the details. Here are the trends both in the threats and how we will respond to them in 2014.
Avi Chesla's picture
What’s missing today is a well-defined set of selection criteria for attack mitigation solutions, mainly for the online business market. Four types of attack mitigation solutions exist in today’s market. In regard to quality of attack mitigation, each one has its own characteristics.
Jeff Hudson's picture
Making decisions based on anomalies is predicated by one very important assumption—you must understand what “normal” looks like.
Mark Hatton's picture
Complacency is never a good thing, but in security it can have devastating effects. While it’s good to acknowledge progress, that should never stand in the way of staying ahead of the next potential threat.
Marc Solomon's picture
With a security approach that incorporates automation, integration and education, control isn’t a pipe dream but a reality that is achievable and necessary to detect, understand and stop threats.
Chris Coleman's picture
The events that occurred in 2013 will forever be reflected in the Internet DNA of the future, and how the cyber security market evolves to accommodate that future.
Dr. Mike Lloyd's picture
Security, like every other arena, can benefit from taking a step back to consider what we’ve done, where we’re going, and what we should try to do differently.
Marc Solomon's picture
As threats and our IT environments have become increasingly sophisticated, they’ve collided with traditional security methods that have not followed suit. Is it possible to simplify security yet increase its ‘sophistication’?