Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Threat protection firm FireEye has announced new targeted attack protection offering for Apple’s Mac OS X and iOS platforms.
The public-facing segments of federal civilian agency networks will be regularly and proactively scanned by the United States Department of Homeland Security (DHS) in an effort to speed up the response to cyber threats and vulnerabilities.
NSS Labs said Palo Alto's next-generation firewall "misses several critical evasions that leave its customers at risk" if run with the default configuration as attackers would be able to bypass the firewall's detection capabilities.
The open source virtual private network solution OpenVPN is reportedly affected by the notorious GNU Bash vulnerability dubbed ShellShock, a researcher revealed on Tuesday.
Palo Alto Networks has launched a new endpoint security solution designed to prevent sophisticated cyber attacks.
In the four days since the vulnerability was disclosed, Incapsula's Web application firewall deflected more than 217,000 exploit attempts on over 4,100 domains. However, the company estimates that the total number of Shellshock attacks could be as high as 1 billion.
CloudFlare has launched Universal SSL, a feature where CloudFlare will automatically provision a SSL certificate on its network that will accept HTTPS connections for customers' domains and subdomains.
Cloud security startup FireLayers has launched a new solution designed to enable enterprises to securely use cloud-based applications.
Akamai Technologies has published a new threat advisory to warn enterprises of distributed denial-of-service (DDoS) attacks leveraging a toolkit dubbed "Spike."
According to a DDoS attack trend report report released Sept. 23, a majority of attacks analyzed (more than 90%) lasted less than 30 minutes, but were repeated frequently.

FEATURES, INSIGHTS // Network Security

rss icon

Scott Simkin's picture
The network edge is the ideal location for quickly preventing the vast majority of attacks, but looking forward, you should consider how pervasive deployments can stop the new breed of advanced attack.
Marc Solomon's picture
Advancing our security controls isn’t going to happen overnight. But we are well on our way with technology and capabilities that are already headed in this direction, implementing dynamic controls to see more, learn more, and adapt quickly.
Rebecca Lawson's picture
There is a widening gap between detection of a threat and enforcement that causes the threat to stop at the firewall, rather than play out its malicious intent.
Marc Solomon's picture
Thanks to significant technological advances what we can do is use knowledge of the past and the present to drive a desired future outcome. That capability is extremely important for better security given today’s threat landscape and the vicious cycle defenders face.
Joshua Goldfarb's picture
Although it may be tempting to envision a world where the analyst has been fully automated, this does not seem particularly reasonable.
Pat Calhoun's picture
Being connected is critical and all the elements of an organization’s security platform should work in concert together to provide adaptive security for the entire environment.
Scott Simkin's picture
Enterprises must tailor their security policy and protections to the actual threats they experience and to the threat landscape at large.
Marc Solomon's picture
With the right information, security professionals can quickly pivot from detection to a full understanding of the scope of the outbreak and take action to head off wider compromises
Pat Calhoun's picture
With a community of nearly 400,000 registered users, Snort remains a valuable tool for security organizations and has certainly flexed its muscles, but it may need some reinforcements to maintain its security longevity.
Joshua Goldfarb's picture
Amidst recent headlines, I am concerned that as a security community, we are losing sight of an important principle that is very important to remember: not all intrusions involve malware.