Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Security research and product-testing firm NSS Labs announced today it has secured $7 Million in additional equity and debt funding.
AlienVault launches Open Threat Exchange (OTX) 2.0 Beta. The security startup has redesigned its threat exchange platform and opened access to the entire security community.
Norse introduced a new intelligence service that leverages a combination of automated and human threat monitoring and analysis to help enterprise security teams detect compromised systems and malicious activity.
FireMon has acquired Immediate Insight to improve real-time security event analysis.
Let's Encrypt takes the world a step closer to a time when more websites would use a certificate and TLS would be the default across the Web, rather than the present where most sites do not even have a valid certificate
As we mark the one-year anniversary of disclosure of the now famous OpenSSL vulnerability known as Heartbleed, security firm Venafi has released new research that shows how vulnerable Global 2000 organizations still are as a result of the flaw.
Endgame, Inc. announced the launch of its enterprise endpoint detection and response platform, Endgame Enterprise.
Norse Corp. has launched a new version of its threat intelligence appliance which can actively monitor inbound and outbound network traffic at up to 10 gigabits-per-second.
Google let a digital certificate expire that was sed to secure its smtp.google.com domain, the domain used by Gmail and Google Apps users to send outgoing email.
ID announced that Emerging Threats will make some of its data available via IID's threat intelligence management system, ActiveTrust.

FEATURES, INSIGHTS // Network Security

rss icon

Marc Solomon's picture
By embedding security everywhere across the extended network, not only does security become more effective against advanced attacks, it also becomes a business enabler.
David Holmes's picture
After the rounds of predictions for 2014, I had bet my colleague that if no mobile DDoS appeared this year, we’d stop talking about it. And it looks like we can.
Joshua Goldfarb's picture
The question of build or buy is not a new one, but it is one that does not adequately suit the implementation of a security solution.
Wade Williamson's picture
Network administrators have to remember that they are not just the protectors of the organization – they are also the most valuable targets.
Scott Gainey's picture
As security professionals, we need to approach shadow IT with a pragmatic view – how can we better support the business’ needs while keeping risk in check.
Jason Polancich's picture
In reality, the beauty of threat intelligence is much more than skin deep. Open source data is just a small part of the threat intelligence picture.
Marc Solomon's picture
To reduce time to detection and time to resolution, threat intelligence must be tactical, contextual, automated, and easily shared.
Travis Greene's picture
The recent development of the democratization of Machine Learning is an indication that it’s time to consider adding it to our security arsenal, as it offers an opportunity to more dynamically measure risk.
Rafal Los's picture
As a potential buyer and consumer of security solutions, how do you know what technologies, products and services will address your needs?
Pat Calhoun's picture
While individual products and technologies are important weapons, they operate in a silo and lose sight of the bigger picture. The reality is that you can’t just rely on a single defense or a silver bullet.