Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

FireEye Security Orchestrator automates interaction between FireEye's product suite and provides an open platform for automation and integration with third party products. [Read More]
Cisco patches critical and high severity vulnerabilities in FirePOWER and TelePresence products [Read More]
By February 2017, Microsoft warned that both Microsoft Edge and Internet Explorer will block SHA-1 signed TLS certificates. [Read More]
Fortinet has unveiled its new Fortinet Security Fabric architecture and a powerful new FortiGate 6000 series firewall designed to tackle the increasing demands from encrypted network traffic. [Read More]
Despite it's privacy and end user security benefits, SSL and TLS traffic encryption brings its own problems for businesses. Encryption is already used by criminals to hide malicious traffic on the basis that defenders cannot find what they cannot see. [Read More]
A new version of the NTP daemon patches several low and medium severity vulnerabilities [Read More]
DDoS attacks have been growing in both size and sophistication for years, but Imperva’s latest report provides a glimpse into some new tools and attack methods being used by threat actors. [Read More]
Cisco patches several critical and high severity vulnerabilities affecting the company’s Wireless LAN Controllers [Read More]
Servers operated by Blizzard Entertainment went down yesterday following a distributed denial of service (DDoS) attack against the video game company,claimed by the Lizard Squad hacking group. [Read More]
One month after announcing that it had issued over one million certificates since opening to the public in December last year, free and open Certificate Authority (CA) Let’s Encrypt has come out of beta. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Alan Cohen's picture
If security can increasingly be distributed into the compute layer—effectively a form of self-protection—we begin to shift the playing field from attacker to defenders.
Ken McAlpine's picture
The emergence of IoT may finally be the technology that brings security from a network afterthought and bolt-on technology to an integral, persistent, omnipresent part of the network.
Avi Chesla's picture
Security technologies must be provisioned with the right policy in order to ensure it complements the neighboring solution, and must also be activated in the right sequence.
Shlomo Kramer's picture
When it comes to deciding why you should re-evaluate security vendors, the solution’s roadmap is of strategic importance because it may require technical analysis and rethinking of the overall network security architecture.
Scott Harrell's picture
Granular network segmentation is a security best practice that dramatically curtails the ability of attackers to move about the network, limiting the spread of destructive malware and ransomware and helping to keep critical assets safe.
David Holmes's picture
How do you secure application components when they’re shifting from cloud to cloud? Any traffic traversing from one public cloud to another is by definition crossing the Internet and should therefore not be trusted.
Wade Williamson's picture
The ability to quickly and reliably detect lateral movement in the network is one of the most important emerging skills in information security today.
Jennifer Blatnik's picture
While it’s important to have multiple layers of defense, more emphasis needs to be placed on how companies integrate, update and manage their security.
Danelle Au's picture
If security teams can automate how they validate security risks, we they shift focus from the easy challenges and onto the important things.
David Holmes's picture
A determined attacker could almost certainly find another, easier (non-SSL) vulnerability much faster and cheaper than by using DROWN.