Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A researcher has disclosed the details of several serious unpatched vulnerabilities affecting D-Link DIR-850L routers [Read More]
Smiths Medical Medfusion 4000 wireless syringe infusion pumps affected by serious flaws. Patches coming only next year [Read More]
A variant of the WireX Android botnet is able to deliver high-volume UDP Flood DDoS attacks, with a single bot capable of generating over 250GB of attack traffic per attack directive. [Read More]
Westermo patches high severity vulnerabilities found by Qualys in the company’s MRD industrial wireless routers [Read More]
Five vulnerabilities have been found in Arris-manufactured home networking equipment supplied in AT&T's U-verse service. [Read More]
Vulnerabilities in PoS systems from SAP and other vendors allow hackers to steal payment card data and change prices [Read More]
Vulnerabilities in Cisco’s IOS software expose industrial switches from Rockwell Automation to remote attacks [Read More]
Google introduces the beta version of the App Engine firewall, a new security feature for its cloud platform [Read More]
Compared to Mirai, which abuses many small devices for powerful DDoS attacks, Pbot can generate 75 Gbps from just 400 nodes, Akamai reports [Read More]
Fuze patches several vulnerabilities discovered by Rapid7 in its online customer portal, including authentication, access control and data transmission issues [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Alan Cohen's picture
There are different types of segmentation architectures: network centric, hypervisor centers, or distributed. Let’s take a look at each one and review the puts and takes of each approach.
Jennifer Blatnik's picture
Protecting this data is a necessity as more and more consumers are voluntarily offering up their rights to security or privacy in search for convenience.
Ashley Arbuckle's picture
Segmentation is an important element of any security strategy to mitigate risk from IoT-based attacks, but it has to be done right.
Erin O’Malley's picture
Can you see into all data across your network? Or does some data remain hidden due to silos between network and security operations teams?
David Holmes's picture
Security researchers found 26 vulnerabilities within ISP network devices that would have given them remote admin access to the majority of home networks in the United States.
Oliver Rochford's picture
Security automation is highly desirable. But this desire has been inhibited by doubt about the accuracy of the detection of threats, and fear of the consequences of automating the containment or mitigation responses.
Jennifer Blatnik's picture
Whether they come from a technical, business or even military background, all CISOs experience a number of personal and professional roadblocks on a daily basis that challenge the ultimate success of their company’s security.
Justin Fier's picture
Every company and organizations is vulnerable to cyber-attacks, and investing in security innovations and gaining total network visibility are more important than ever.
Erin O’Malley's picture
Finding patterns and uncovering clues within network noise requires both broad and granular visibility into traffic (plain-text and encrypted) and is essential for defense against advanced threats.
Alan Cohen's picture
Since VMware introduced the concept of micro-segmentation for data center security, the security and networking industry have been racing to introduce competing technologies to reduce the lateral spread of bad actors in the data center and cloud.