Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Huawei CEO Ren Zhengfei said at the World Economic Forum that China has never asked it to spy on the United States or others.
The gulf between reality and perception is widening, according to Cisco’s annual survey of CISOs and security executives.
Analysis of the Naenara Browser, a version of Mozilla Firefox modified by North Korea and bundled into Red Star OS, shows the DPRK may be funneling all traffic through one—or a handful—of public IP addresses.
The popular open source intrusion prevention system (IPS) Snort has been completely rewritten and fitted with several new features, Cisco announced on Thursday.
Vectra Networks has made some improvements to its real-time threat detection platform to help organizations protect their networks against insiders and targeted attacks.
Recursive Domain Name System (DNS) resolvers are plagued by a vulnerability that can be leveraged to cause them to crash due to resource exhaustion, the CERT Coordination Center at Carnegie Mellon University (CERT/CC) reported.
Fortinet has launched four new “Rugged” products purpose-built to meet the demanding standards industrial networks that operate in harsh physical environments.
BIND, the most widely used Domain Name System (DNS) software, has been updated to address several remotely exploitable vulnerabilities.
Communications encrypted with the transport layer security (TLS) protocol are also vulnerable to Padding Oracle On Downgraded Legacy Encryption (POODLE) attacks, according to researchers.
OpenDNS unveiled a new security platform and APIs designed to enable security vendors to integrate with OpenDNS’s network and extend their threat protection across any device in any location.

FEATURES, INSIGHTS // Network Security

rss icon

Marc Solomon's picture
“Slow and Low” isn’t just a popular song by the Beastie Boys. It’s also the tempo that adversaries are now choosing to launch attacks and evade detection.
Joshua Goldfarb's picture
The past few decades in the information security field have been dominated by passive failure. Clearly, not every new idea has merit, but those ideas that come about scientifically and methodically have tremendous potential to improve the state of security.
Rebecca Lawson's picture
As we enter the New Year, it’s time to reflect on these latest occurrences and consider what they may lead to in the year that lies ahead.
Nate Kube's picture
There are interesting lessons learned from IT IPS experiences that OT can benefit from. The first is to understand how attackers have bypassed traditional IPS IT solutions.
Scott Gainey's picture
Several financial analyst firms concluded extensive studies, surveying over a thousand CIOs and CSOs cumulatively, to gain a better understanding of how these breaches are impacting spending behaviors.
Marc Solomon's picture
The threat landscape is ever evolving and always advancing with tailor-made, stealthy threats that evade traditional, point-in-time security defenses.
David Holmes's picture
The media was so taken with the idea that Kate Upton nude photos had caused a DDoS attack that they just took the story and ran with it. But what really caused disrupted service across New Zealand’s major ISPs?
Avi Chesla's picture
In order to be effective, security solutions must become more directly associated, in real-time, to cyber defense planning models.
Rebecca Lawson's picture
Moving towards an adaptive and automated way of applying intelligence based on behavior and heuristics is clearly moving in the right direction to enable a more actionable and relevant set of controls.
Pat Calhoun's picture
A faster, poorly secured network can actually accelerate the spread of APTs, while building protection against threats can slow down networks.