Security Experts:

long dotted


Cisco has found a zero-day vulnerability in IOS software after further analyzing the exploits leaked by Shadow Brokers [Read More]
Cisco patches critical remote command execution and high severity DoS vulnerabilities in WebEx Meetings Server [Read More]
Starting in January 2017, Chrome will mark HTTP sites as non-secure when they transmit sensitive information such as passwords or credit card information, Google said this week. [Read More]
An unpatched vulnerability affecting Cisco ACE products has been triggered on some devices during an Internet research project [Read More]
An analysis of network management systems showed that products from several vendors are vulnerable to SNMP-based attacks [Read More]
Researchers find several potentially serious vulnerabilities in load balancers from Fortinet. Some of the issues have been fixed [Read More]
Tens of thousands of Cisco ASA devices are still vulnerable to the Extrabacon exploit leaked by Shadow Brokers [Read More]
The number of IoT devices exposed to attacks due to the reuse of cryptographic keys has increased by more than one million in the past 9 months [Read More]
Redis servers that are exposed to the Internet are prone to attacks similar to the newly discovered FairWare ransomware, researchers reveal. [Read More]
The 2016 Rio Olympics weren’t all about the games, but also about overcoming some of the largest distributed denial of service (DDoS) attacks, Arbor Networks researchers reveal. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

David Holmes's picture
SWEET32 is probably not something that an enterprise administrator needs to lose sleep over. Very likely, we will never see a SWEET32 attack in the wild, just as we never have for POODLE or BEAST.
Ken McAlpine's picture
Perhaps it’s time to look at Open Security as the next necessary iteration of deploying security technology.
Wade Williamson's picture
A data center will often encounter an attacker at a far more mature phase of attack than the perimeter will, and likewise, will experience different types of threats and attack techniques.
David Holmes's picture
SSL/TLS-encrypted traffic has become so common today that the attack communication with bots now goes undetected by these security solutions.
Erin O’Malley's picture
To understand SIEM, it’s important to first understand when people started to care about network security. And to do that, we need to take a step back in time.
Jennifer Blatnik's picture
Listen to your coach. Similar to the Olympics, a CSO or CISO needs to be able to lead their team and consider the impact they will have on the broader organization.
Nathaniel Gleicher's picture
Cybersecurity defenders face a similar problem to the Secret Service: they are defending high-value assets that must be protected, but also have to speak to hundreds or thousands of other servers.
Jennifer Blatnik's picture
While using containers to secure your organization is a relatively novel approach, it can lead to cost savings and massive scalability.
Ken McAlpine's picture
Once you have an understanding of where your security risks are, you can make better choices about what types and what sources of threat intelligence are most applicable.
Joshua Goldfarb's picture
Analytics is becoming ever more important, and in my opinion, it is an important part of the future of information security.