Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Cisco patches critical RCE/DoS vulnerability affecting CVR100W small business routers [Read More]
Netgear releases firmware updates to patch remote code execution vulnerabilities in some of its routers and switches [Read More]
Moxa addresses hardcoded credentials issue that can be exploited by attackers to gain complete control of the company’s APs [Read More]
IOActive researchers found 10 vulnerabilities affecting more than 20 models of Linksys Smart Wi-Fi routers [Read More]
Cisco has released software updates to patch high severity DoS vulnerabilities in Firepower, ASA, IOS and UCM products [Read More]
Juniper Networks patches several high and medium severity vulnerabilities with Junos OS updates [Read More]
Mandatory Certificate Authority Authorization (CAA) checks will make the issuance of SSL/TLS (Secure Sockets Layer/Transport Layer Security) certificates a more secure process. [Read More]
Cisco Talos researchers identified over a dozen vulnerabilities in Moxa industrial wireless access points (APs) as part of a two-week analysis of the product [Read More]
Researchers find serious vulnerabilities in Riverbed’s SteelCentral application and network performance monitoring system [Read More]
QNAP patches 20 vulnerabilities in NAS products, including ones that can be exploited to take control of affected devices [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Marie Hattar's picture
Monitoring and securing modern network flows requires granular insight, only possible through sophisticated and automated analytics and security tools.
Marc Solomon's picture
Intelligence-driven security starts with changing how we collect and manage the millions of points of threat data that analysts are bombarded with every day.
Ashley Arbuckle's picture
By aligning your segmentation strategy to business objectives you can respond quickly to the needs of the business while reducing risk and protecting data and applications.
Lance Cottrell's picture
The old castle wall model of perimeter security is almost worthless and often leads to poorly designed architectures and strategies.
Ken McAlpine's picture
When looking to solve IoT security challenges, look for products that support a multi-vendor enforcement fabric to share, synchronize, and automatically respond to threats.
Scott Simkin's picture
In discussions about cybersecurity, a word that gets used a lot is “prevention.” How do you prevent cyberattacks before they succeed?
Erin O’Malley's picture
Visibility—delivered via a centralized platform—is the only thing that is going to bring order to the kluge that is the modern-day network.
David Holmes's picture
Since Dyn is the major DNS provider for Twitter, Github, and Spotify, the knock-on effects of the massive DDoS attack have had a global reach.
Marie Hattar's picture
Marie Hattar of Ixia looks at the growing armies of botnets, and how their tactics can be nullified using intelligent IP address filtering.
Erin O’Malley's picture
A security delivery platform delivers visibility into lateral movement of attackers, accelerates detection of data theft activity, and can reduce the overhead, complexity, and costs associated with security deployments.