Security Experts:

long dotted


Researchers have detected 57 Million Scans for a backdoor in Netis routers through the UDP port 53413. [Read More]
Starting on February 14, 2017, Microsoft’s Edge and Internet Explorer 11 web browsers will no longer load sites protected with a SHA-1 certificate. [Read More]
Several DoS vulnerabilities, including one rated high severity, have been patched in the Network Time Protocol (NTP) [Read More]
Starting on Jan 1, 2017, most CAs will migrate to SHA-2 certificates, but 35% of websites still use such certificates today, according to a new report. [Read More]
The Mirai IoT botnet has been using STOMP (Simple Text Oriented Messaging Protocol) floods to attack targets, a protocol that isn’t normally associated with distributed denial of service (DDoS) attacks. [Read More]
The hacker who launched a massive DDoS attack against Dyn, which operates a key hub in the internet, was probably a disgruntled gamer, said Dale Drew, chief security officer for Level 3 Communications. [Read More]
RiskIQ, which helps detect digital threats stemming from areas such as the Web, malvertising and social media, has closed $30.5 in a Series C funding round led by Georgian Partners. [Read More]
Cyber threat protection and intelligence firm FireEye this week launched new cloud-based network security and threat intelligence offerings amid improving finances with its earnings report for the third quarter of 2016. [Read More]
Security analytics and testing firm Rapid7 this week unveiled Project Heisenberg Cloud, a research project designed to use the cloud to get a closer look at what attackers are doing, both in the cloud and across the Internet. [Read More]
Starting in October 2017, publicly trusted website certificates will have to comply with Chrome’s Certificate Transparency (CT) policy to be trusted by the browser. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Marie Hattar's picture
Monitoring and securing modern network flows requires granular insight, only possible through sophisticated and automated analytics and security tools.
Marc Solomon's picture
Intelligence-driven security starts with changing how we collect and manage the millions of points of threat data that analysts are bombarded with every day.
Ashley Arbuckle's picture
By aligning your segmentation strategy to business objectives you can respond quickly to the needs of the business while reducing risk and protecting data and applications.
Lance Cottrell's picture
The old castle wall model of perimeter security is almost worthless and often leads to poorly designed architectures and strategies.
Ken McAlpine's picture
When looking to solve IoT security challenges, look for products that support a multi-vendor enforcement fabric to share, synchronize, and automatically respond to threats.
Scott Simkin's picture
In discussions about cybersecurity, a word that gets used a lot is “prevention.” How do you prevent cyberattacks before they succeed?
Erin O’Malley's picture
Visibility—delivered via a centralized platform—is the only thing that is going to bring order to the kluge that is the modern-day network.
David Holmes's picture
Since Dyn is the major DNS provider for Twitter, Github, and Spotify, the knock-on effects of the massive DDoS attack have had a global reach.
Marie Hattar's picture
Marie Hattar of Ixia looks at the growing armies of botnets, and how their tactics can be nullified using intelligent IP address filtering.
Erin O’Malley's picture
A security delivery platform delivers visibility into lateral movement of attackers, accelerates detection of data theft activity, and can reduce the overhead, complexity, and costs associated with security deployments.