Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The Linux Foundation has added a two-factor authentication (2FA) mechanism to the source code repositories housing the Linux kernel in an effort to improve access security for developers.
Facebook has fixed a vulnerability that could have been leveraged to amplify distributed denial-of-service (DDoS) attacks by using the company's own datacenters.
The average peak size of distributed denial-of-service (DDoS) attacks in the second quarter of 2014 increased by 216% compared to the first quarter, according to the latest trends report from Verisign.
The National Security Agency is developing a tool that can detect cyberattacks from an adversary by analyzing Internet traffic and respond automatically, a leaked document showed.
According to Damballa, there is no correlation between the size of an organization and the proportion of machines infected with malware.
Splunk has introduced a new application that's designed to help enterprises capture real-time streaming wire data.
LogRhythm's Honeypot Security Analytics Suite helps customers deploy honeypots to attract opportunistic hackers and then capture network and log activity.
Lookingglass Cyber Solutions has released a new solution designed to help organizations correlate threat intelligence feeds with network telemetry in order to generate actionable threat reports.
FishNet Security has opened a new technology testing lab that allows partners and customers to vet technologies in a virtual IT environment using simulated network conditions and attack scenarios.
Vectra Networks, a provider of real-time detection of cyber attacks in progress, has received $25 Million in an oversubscribed Series C financing round led by VC firm Accel Partners.

FEATURES, INSIGHTS // Network Security

rss icon

Marc Solomon's picture
With the right information, security professionals can quickly pivot from detection to a full understanding of the scope of the outbreak and take action to head off wider compromises
Pat Calhoun's picture
With a community of nearly 400,000 registered users, Snort remains a valuable tool for security organizations and has certainly flexed its muscles, but it may need some reinforcements to maintain its security longevity.
Joshua Goldfarb's picture
Amidst recent headlines, I am concerned that as a security community, we are losing sight of an important principle that is very important to remember: not all intrusions involve malware.
Joshua Goldfarb's picture
I am often asked the question: “Is security an unsolvable problem?” In order for me to answer that question, I would have to understand it, and I don’t.
Pat Calhoun's picture
The need for extreme network protection may be the driving force behind your decision to invest in a next-generation firewall (NGFW), but your enterprise also has other factors to consider.
Mark Hatton's picture
You need to identify your security shortcomings before someone else does. Simulate attacks and tests to associate known vulnerabilities, previous attack patterns, and security/network data to identify potential attack paths to your company’s most important data.
Marc Solomon's picture
To help cybersecurity professionals cut through the hype and gain a better understanding of what to expect as the Internet of Everything continues to evolve, these top 10 observations might help.
Joshua Goldfarb's picture
An organization that keeps records of its security incidents should be able to study that data to understand the top ways in which it is generally becoming compromised.
Rebecca Lawson's picture
As enterprises made trade-offs in security; either sacrifice performance in order to add more layers of security beyond the traditional stateful firewall or don’t implement the new protections necessary to protect against many of the latest threats.
Danelle Au's picture
As the era of Internet of Things dawns, the amount of data and other cloud applications developed for unique industries will increase and bring a new era of privacy and security concerns.