Security Experts:

long dotted


Critical SQL injection vulnerability in McAfee ePolicy Orchestrator (ePO) is ideal for profiling the users and infrastructure of a targeted organization [Read More]
Cisco patches critical authentication bypass vulnerability in Prime Home remote management and provisioning solution [Read More]
Hewlett Packard Enterprise (NYSE: HPE) announced on Wednesday that it has acquired Niara, a provider of User and Entity Behavior Analytics (UEBA) software, for an undisclosed sum. [Read More]
Printers from various vendors are affected by vulnerabilities that can be exploited for DoS attacks, stealing sensitive data and accessing enterprise networks [Read More]
A serious authentication bypass vulnerability affects more than 30 NETGEAR router models. Patches available for many devices [Read More]
IBM patches two XSS vulnerabilities discovered in its InfoSphere BigInsights analytics platform by a Fortinet researcher [Read More]
Cisco issues proper fix for the critical vulnerability in the WebEx extension for Chrome. Fixes for Internet Explorer and Firefox still not available [Read More]
Cisco has patched critical and high severity vulnerabilities in its TelePresence and Expressway collaboration products [Read More]
The largest of DDoS attack in 2016 peaked at 800 Gbps (gigabit per second), compared to only 500 Gbps in 2015. [Read More]
Researcher who took part in Hack the Army program gained access to an internal DoD network from a public-facing Army careers website [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Erin O’Malley's picture
A security delivery platform delivers visibility into lateral movement of attackers, accelerates detection of data theft activity, and can reduce the overhead, complexity, and costs associated with security deployments.
Marie Hattar's picture
By following these best practice techniques, you can ensure that your security architecture maximizes your company’s overall security posture and its efficiency.
David Holmes's picture
SWEET32 is probably not something that an enterprise administrator needs to lose sleep over. Very likely, we will never see a SWEET32 attack in the wild, just as we never have for POODLE or BEAST.
Ken McAlpine's picture
Perhaps it’s time to look at Open Security as the next necessary iteration of deploying security technology.
Wade Williamson's picture
A data center will often encounter an attacker at a far more mature phase of attack than the perimeter will, and likewise, will experience different types of threats and attack techniques.
David Holmes's picture
SSL/TLS-encrypted traffic has become so common today that the attack communication with bots now goes undetected by these security solutions.
Erin O’Malley's picture
To understand SIEM, it’s important to first understand when people started to care about network security. And to do that, we need to take a step back in time.
Jennifer Blatnik's picture
Listen to your coach. Similar to the Olympics, a CSO or CISO needs to be able to lead their team and consider the impact they will have on the broader organization.
Nathaniel Gleicher's picture
Cybersecurity defenders face a similar problem to the Secret Service: they are defending high-value assets that must be protected, but also have to speak to hundreds or thousands of other servers.
Jennifer Blatnik's picture
While using containers to secure your organization is a relatively novel approach, it can lead to cost savings and massive scalability.