Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Trend Micro patches several vulnerabilities that can lead to arbitrary command execution in its Deep Discovery Director product [Read More]
Darktrace has raised $75 million in a Series D financing round which values the company at $825 million. [Read More]
HPE warns of security bypass, information disclosure, remote code execution, XSS and URL redirection vulnerabilities in several products [Read More]
A fully automated SQLi vulnerability scanner is available for purchase on a hacking forum at only $500, Recorded Future security researchers have discovered. [Read More]
Cisco fixes several vulnerabilities in its Ultra Services Framework and Elastic Services Controller products [Read More]
An unpatched vulnerability affecting Humax WiFi Router model HG-100R allows attackers to compromise the WiFi credentials and even retrieve the router console administrative password. [Read More]
WikiLeaks details OutlawCountry, a tool used by the CIA to redirect traffic from Linux systems [Read More]
Industry professionals comment on the destructive attacks involving the wiper malware known as Petya.A, Petrwrap, NotPetya, exPetr and GoldenEye [Read More]
Cisco warns customers of high severity remote code execution vulnerabilities affecting its IOS software. No patch available yet [Read More]
Authentication bypass vulnerability related to the TSIG protocol patched in BIND and Knot DNS [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Oliver Rochford's picture
Security automation is highly desirable. But this desire has been inhibited by doubt about the accuracy of the detection of threats, and fear of the consequences of automating the containment or mitigation responses.
Jennifer Blatnik's picture
Whether they come from a technical, business or even military background, all CISOs experience a number of personal and professional roadblocks on a daily basis that challenge the ultimate success of their company’s security.
Justin Fier's picture
Every company and organizations is vulnerable to cyber-attacks, and investing in security innovations and gaining total network visibility are more important than ever.
Erin O’Malley's picture
Finding patterns and uncovering clues within network noise requires both broad and granular visibility into traffic (plain-text and encrypted) and is essential for defense against advanced threats.
Alan Cohen's picture
Since VMware introduced the concept of micro-segmentation for data center security, the security and networking industry have been racing to introduce competing technologies to reduce the lateral spread of bad actors in the data center and cloud.
Eddie Garcia's picture
Apache Spot is in its early stages yet it already has all the potential to be the platform where the good guys collaborate, sharing models and algorithms to find the bad actors.
Ken McAlpine's picture
Once you’ve decided that you need to include some SD-WAN capabilities to your network, you should also look at the implications to your security practices.
Ashley Arbuckle's picture
When it comes to automation, most defenders are operating at a deficit. So what’s holding so many enterprises back from incorporating automation in their security programs?
Preston Hogue's picture
Defenders need a new type of counterinsurgent security that can move out into the jungle to protect users and sensitive data against attackers who disguise their exploits with the very encryption that we think keeps us safe.
Marie Hattar's picture
Understanding how well (or not) websites and networks deal with the unexpected spikes in inbound traffic is the first step in dealing with DDoS attacks.