Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Security researchers at IOActive have discovered multiple security vulnerabilities in the BHU Wi-Fi “uRouter,” a device that is manufactured and sold in China. [Read More]
Cisco patches several vulnerabilities in Firepower management appliance, including two critical issues [Read More]
Cisco, Fortinet and WatchGuard have analyzed the exploits leaked from an NSA-linked hacking group. Cisco has found a zero-day vulnerability [Read More]
Facebook announces winner of 2016 Internet Defense Prize – $100,000 awarded for research on post-quantum security for TLS [Read More]
D-Link has patched a critical remote code execution vulnerability affecting several DIR model routers [Read More]
The RC4 cipher has been disabled in Edge (Windows 10) and Internet Explorer 11 (Windows 7 and newer), bringing Microsoft’s browsers in line with Chrome and Firefox. [Read More]
Juniper Networks has started patching a DoS vulnerability related to the processing of IPV6 ND packets. The flaw affects several vendors [Read More]
Australia was forced to reassure its citizens that their personal data was secure, after malicious attacks by overseas hackers prompted an embarrassing shutdown of the online census. [Read More]
Researchers disclose XSS vulnerabilities found in Fortinet FortiManager, FortiAnalyzer, FortiVoice and FortiCloud products [Read More]
Accenture has announced a new partnership with Palo Alto Networks (PAN), Splunk and Tanium, with the goal of providing an integrated security solution that covers the primary bases swiftly and efficiently. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Erin O’Malley's picture
To understand SIEM, it’s important to first understand when people started to care about network security. And to do that, we need to take a step back in time.
Jennifer Blatnik's picture
Listen to your coach. Similar to the Olympics, a CSO or CISO needs to be able to lead their team and consider the impact they will have on the broader organization.
Nathaniel Gleicher's picture
Cybersecurity defenders face a similar problem to the Secret Service: they are defending high-value assets that must be protected, but also have to speak to hundreds or thousands of other servers.
Jennifer Blatnik's picture
While using containers to secure your organization is a relatively novel approach, it can lead to cost savings and massive scalability.
Ken McAlpine's picture
Once you have an understanding of where your security risks are, you can make better choices about what types and what sources of threat intelligence are most applicable.
Joshua Goldfarb's picture
Analytics is becoming ever more important, and in my opinion, it is an important part of the future of information security.
David Holmes's picture
The portion of encrypted traffic keeps rising, so IT security administrators will be forced to do more SSL decryption if they are to get any value at all out of their fancy security tools.
Wade Williamson's picture
Collecting security data is relatively easy – the value of security analytics solutions will rest in how well they reduce that data into answers.
Ashley Arbuckle's picture
Regardless of what industry you’re in, your ability to successfully compete in the digital economy requires the ability to securely innovate.
Emily Ratliff's picture
The Assimilation Project performs service discovery and inventory of your systems in great detail and stores the resulting data so that it can be queried.