Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Netgear releases firmware updates for D3600 and D6000 modem routers to patch two serious vulnerabilities [Read More]
Singapore's prime Minister Lee Hsien Loong has defended the country's controversial decision to cut off civil servants' work computers from the Internet [Read More]
A DoS vulnerability related to IPv6 processing has been found to affect both Cisco and Juniper Networks products [Read More]
Singapore confirmed it would cut off Internet access for government work stations within a year for security reasons, a surprise move in one of the world's most wired countries. [Read More]
Dominated by an overall increase in the number of distributed denial of service (DDoS) attacks, the first quarter of 2016 also saw a record number of attacks larger than 100 Gbps, a report from Akamai reveals. [Read More]
Rapid7's National Exposure Index is a port scan and exposure index of the entire Internet. [Read More]
Fortinet acquires network security monitoring and analytics company AccelOps for $28 million in cash [Read More]
Cisco releases patches for medium and high severity vulnerabilities in Prime Network Analysis Module products [Read More]
Inexpensive devices can be used to wirelessly alter the time on NTP servers, researchers demonstrate at HITB hacker conference [Read More]
For all of last week and continuing into this week, major DNS and traffic management provider NS1 suffered a continuing and complex DDoS attack from unknown attackers with unknown motivation. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Joshua Goldfarb's picture
Analytics is becoming ever more important, and in my opinion, it is an important part of the future of information security.
David Holmes's picture
The portion of encrypted traffic keeps rising, so IT security administrators will be forced to do more SSL decryption if they are to get any value at all out of their fancy security tools.
Wade Williamson's picture
Collecting security data is relatively easy – the value of security analytics solutions will rest in how well they reduce that data into answers.
Ashley Arbuckle's picture
Regardless of what industry you’re in, your ability to successfully compete in the digital economy requires the ability to securely innovate.
Emily Ratliff's picture
The Assimilation Project performs service discovery and inventory of your systems in great detail and stores the resulting data so that it can be queried.
Joshua Goldfarb's picture
The trust between those who run the security organization, and the analysts, incident responders, engineers, and others who do the work on a daily basis is extremely important.
Johnnie Konstantas's picture
When I decided to write a piece on metadata, my first thought was: How can I make this short and sweet, like metadata? My next thought: A haiku!
Alan Cohen's picture
If security can increasingly be distributed into the compute layer—effectively a form of self-protection—we begin to shift the playing field from attacker to defenders.
Ken McAlpine's picture
The emergence of IoT may finally be the technology that brings security from a network afterthought and bolt-on technology to an integral, persistent, omnipresent part of the network.
Avi Chesla's picture
Security technologies must be provisioned with the right policy in order to ensure it complements the neighboring solution, and must also be activated in the right sequence.