Security Experts:

long dotted


Microsoft announced the preview version of Advanced Threat Analytics (ATA), an on-premises solution designed for detecting sophisticated attacks.
The growth of the Internet of Things and the security challenges it poses are among the security topics being discussed at the RSA Conference.
The IBM X-Force Exchange allows enterprise security teams and researchers to collaborate on security incidents and sift through troves of cyber threat intelligence data.
Zscaler launched a new cloud-based next-generation firewall that provides network security, application control and visibility from any location, with no on-premise hardware or software required.
Security research and product-testing firm NSS Labs announced today it has secured $7 Million in additional equity and debt funding.
AlienVault launches Open Threat Exchange (OTX) 2.0 Beta. The security startup has redesigned its threat exchange platform and opened access to the entire security community.
Norse introduced a new intelligence service that leverages a combination of automated and human threat monitoring and analysis to help enterprise security teams detect compromised systems and malicious activity.
FireMon has acquired Immediate Insight to improve real-time security event analysis.
Let's Encrypt takes the world a step closer to a time when more websites would use a certificate and TLS would be the default across the Web, rather than the present where most sites do not even have a valid certificate
As we mark the one-year anniversary of disclosure of the now famous OpenSSL vulnerability known as Heartbleed, security firm Venafi has released new research that shows how vulnerable Global 2000 organizations still are as a result of the flaw.

FEATURES, INSIGHTS // Network Security

rss icon

Jason Polancich's picture
Without a solid base in knowing who you are as a target and what’s going on around you at all times, everything else you do is essentially a half-measure.
David Holmes's picture
DDoS continues to wax and wane in unpredictable cycles, but the ecosystem has evolved to keep it out of the mobile space.
Wade Williamson's picture
While higher education certainly has some unique challenges, they are by no means alone in terms of facing breaches. Attackers who want to get into a network can typically afford to be patient.
Joshua Goldfarb's picture
Life is full of distractions, and the information security profession is not immune to them. Security professionals have an obligation to remain focused on building, maturing, and improving our security programs and security postures.
Marc Solomon's picture
By embedding security everywhere across the extended network, not only does security become more effective against advanced attacks, it also becomes a business enabler.
David Holmes's picture
After the rounds of predictions for 2014, I had bet my colleague that if no mobile DDoS appeared this year, we’d stop talking about it. And it looks like we can.
Joshua Goldfarb's picture
The question of build or buy is not a new one, but it is one that does not adequately suit the implementation of a security solution.
Wade Williamson's picture
Network administrators have to remember that they are not just the protectors of the organization – they are also the most valuable targets.
Scott Gainey's picture
As security professionals, we need to approach shadow IT with a pragmatic view – how can we better support the business’ needs while keeping risk in check.
Jason Polancich's picture
In reality, the beauty of threat intelligence is much more than skin deep. Open source data is just a small part of the threat intelligence picture.