Security Experts:

long dotted


Cisco, Fortinet and WatchGuard have analyzed the exploits leaked from an NSA-linked hacking group. Cisco has found a zero-day vulnerability [Read More]
Facebook announces winner of 2016 Internet Defense Prize – $100,000 awarded for research on post-quantum security for TLS [Read More]
D-Link has patched a critical remote code execution vulnerability affecting several DIR model routers [Read More]
The RC4 cipher has been disabled in Edge (Windows 10) and Internet Explorer 11 (Windows 7 and newer), bringing Microsoft’s browsers in line with Chrome and Firefox. [Read More]
Juniper Networks has started patching a DoS vulnerability related to the processing of IPV6 ND packets. The flaw affects several vendors [Read More]
Australia was forced to reassure its citizens that their personal data was secure, after malicious attacks by overseas hackers prompted an embarrassing shutdown of the online census. [Read More]
Researchers disclose XSS vulnerabilities found in Fortinet FortiManager, FortiAnalyzer, FortiVoice and FortiCloud products [Read More]
Accenture has announced a new partnership with Palo Alto Networks (PAN), Splunk and Tanium, with the goal of providing an integrated security solution that covers the primary bases swiftly and efficiently. [Read More]
Several critical and high severity vulnerabilities have been found in Cisco’s Small Business RV series routers [Read More]
IBM this week unveiled a new penetration testing group that will operate under its security services division to help customers uncover security gaps in their networks. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Erin O’Malley's picture
To understand SIEM, it’s important to first understand when people started to care about network security. And to do that, we need to take a step back in time.
Jennifer Blatnik's picture
Listen to your coach. Similar to the Olympics, a CSO or CISO needs to be able to lead their team and consider the impact they will have on the broader organization.
Nathaniel Gleicher's picture
Cybersecurity defenders face a similar problem to the Secret Service: they are defending high-value assets that must be protected, but also have to speak to hundreds or thousands of other servers.
Jennifer Blatnik's picture
While using containers to secure your organization is a relatively novel approach, it can lead to cost savings and massive scalability.
Ken McAlpine's picture
Once you have an understanding of where your security risks are, you can make better choices about what types and what sources of threat intelligence are most applicable.
Joshua Goldfarb's picture
Analytics is becoming ever more important, and in my opinion, it is an important part of the future of information security.
David Holmes's picture
The portion of encrypted traffic keeps rising, so IT security administrators will be forced to do more SSL decryption if they are to get any value at all out of their fancy security tools.
Wade Williamson's picture
Collecting security data is relatively easy – the value of security analytics solutions will rest in how well they reduce that data into answers.
Ashley Arbuckle's picture
Regardless of what industry you’re in, your ability to successfully compete in the digital economy requires the ability to securely innovate.
Emily Ratliff's picture
The Assimilation Project performs service discovery and inventory of your systems in great detail and stores the resulting data so that it can be queried.