Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Cyphort, a provider of threat detection solutions, has secured $30 million in Series C funding, bringing the total raised by the company to more than $53 million.
Fortinet has agreed to acquire Meru Networks (NASDAQ: MERU), a provider of enterprise wireless networking solutions, for roughly $44 million in cash.
Cybereason, a Cambridge, Mass.-based provider of threat detection solutions, has closed a $25 million Series B funding round, with defense contractor Lockheed Martin participating as a strategic investor.
Microsoft announced the preview version of Advanced Threat Analytics (ATA), an on-premises solution designed for detecting sophisticated attacks.
The growth of the Internet of Things and the security challenges it poses are among the security topics being discussed at the RSA Conference.
The IBM X-Force Exchange allows enterprise security teams and researchers to collaborate on security incidents and sift through troves of cyber threat intelligence data.
Zscaler launched a new cloud-based next-generation firewall that provides network security, application control and visibility from any location, with no on-premise hardware or software required.
Security research and product-testing firm NSS Labs announced today it has secured $7 Million in additional equity and debt funding.
AlienVault launches Open Threat Exchange (OTX) 2.0 Beta. The security startup has redesigned its threat exchange platform and opened access to the entire security community.
Norse introduced a new intelligence service that leverages a combination of automated and human threat monitoring and analysis to help enterprise security teams detect compromised systems and malicious activity.

FEATURES, INSIGHTS // Network Security

rss icon

Rafal Los's picture
Often times it’s the insiders that enable the external attacker – either willingly or otherwise, and the result can be even more devastating than that of an external attacker.
Travis Greene's picture
Can IT security find a way to coexist with wearables faster than the first BYOD war and avoid a second war?
Scott Simkin's picture
In the moments after a breach, security teams will often focus on the event itself, but not draw additional insight from the attack, or analyze the events surrounding it.
Rebecca Lawson's picture
Although technology products are time and time again heavily relied on and placed at the forefront of defense, there is another critical element that needs just as much focus: training the next generation of technology professionals.
Alan Cohen's picture
Just as enterprise computing is having a DevOps moment, much of the security profession has woken up to the fact they are mired in the traditional infrastructure and silo approach.
Marc Solomon's picture
Just as the graduating class of 2015 will evolve how they operate to realize their full potential in the real world, we must evolve our approach to security in the Digital Economy.
Jason Polancich's picture
Without a solid base in knowing who you are as a target and what’s going on around you at all times, everything else you do is essentially a half-measure.
David Holmes's picture
DDoS continues to wax and wane in unpredictable cycles, but the ecosystem has evolved to keep it out of the mobile space.
Wade Williamson's picture
While higher education certainly has some unique challenges, they are by no means alone in terms of facing breaches. Attackers who want to get into a network can typically afford to be patient.
Joshua Goldfarb's picture
Life is full of distractions, and the information security profession is not immune to them. Security professionals have an obligation to remain focused on building, maturing, and improving our security programs and security postures.