Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

OpenDNS has enhanced its cloud-based network security service Umbrella with new capabilities designed to protect organizations against targeted attacks.
FireEye Operating System (FEOS) updates that address a series of security vulnerabilities have been released for several products.
Rogue digital certificates issued in India for several Google domains were identified and blocked last week, Google representatives said.
A group operating under the name Tunisian Hackers Team are targeting the websites of government agencies and large organizations with distributed denial of service (DDoS) attacks, according to a threat advisory.
Please join Palo Alto Networks and SecurityWeek on Wednesday, July 9th at 1:00 PM ET for an informative webcast on how your organization can better detect and prevent advanced cyber attacks.
A remote attacker could log into NETGEAR GS108PE ProSAFE Plus Switches and execute arbitrary code because of hardcoded credentials installed within the firmware used on the devices.
Barracuda Networks announced the immediate availability of Barracuda Firewall version 6.5, the latest release of its next-generation firewall designed for the mid-market.
Unified security management solutions provider AlienVault has updated its Open Threat Exchange (OTX), the company's open, crowdsourced threat intelligence sharing system.
SafeNet has launched a new suite of high-speed encryption (HSE) solutions designed to help organizations protect sensitive data across corporate networks and data centers.
Cisco has addressed a cross-site scripting (XSS) vulnerability affecting the Web management interface of Cisco AsyncOS, the operating system used for some of the company’s security appliances.

FEATURES, INSIGHTS // Network Security

rss icon

Mark Hatton's picture
You need to identify your security shortcomings before someone else does. Simulate attacks and tests to associate known vulnerabilities, previous attack patterns, and security/network data to identify potential attack paths to your company’s most important data.
Marc Solomon's picture
To help cybersecurity professionals cut through the hype and gain a better understanding of what to expect as the Internet of Everything continues to evolve, these top 10 observations might help.
Joshua Goldfarb's picture
An organization that keeps records of its security incidents should be able to study that data to understand the top ways in which it is generally becoming compromised.
Rebecca Lawson's picture
As enterprises made trade-offs in security; either sacrifice performance in order to add more layers of security beyond the traditional stateful firewall or don’t implement the new protections necessary to protect against many of the latest threats.
Danelle Au's picture
As the era of Internet of Things dawns, the amount of data and other cloud applications developed for unique industries will increase and bring a new era of privacy and security concerns.
Torsten George's picture
While the initial investment in a proof of concept can be costly, the end results might not only justify the additional expenses, but in the long-term save you money (and your job).
Joshua Goldfarb's picture
Not all security technologies are alert driven, but for those that are, there is huge potential value in turning off the default rule set
Marc Solomon's picture
With the right approach to security you can protect your organization’s sensitive information from both insiders and outsiders.
Jason Polancich's picture
Studying a problem from every angle and every level always leads to more practical solutions and quicker (re)action.
Aviv Raff's picture
While the phrase “cyber kill chain” is embedded in the cyber security vocabulary, many enterprises are still not proactive about keeping their assets, data, and reputations safe from bad actors.