Security Experts:

long dotted


A vulnerability disclosed in June that affected a Wi-Fi camera has been found to affect over 120 products from D-Link. [Read More]
Darktrace, a cybersecurity startup that leverages machine learning and mathematics to detect threats, has raised $65 million from a group of investors led by private equity firm KKR. [Read More]
LizardStresser, a DDoS botnet that inspired many cybercrime groups to create their own botnets, was recently used in attacks as large as 400 gigabits per second (Gbps) that leverage the power of IoT devices. [Read More]
Dan Schiappa, VP with Sophos, has published a stinging rebuke against Cylance product comparison methods, saying the Cylance rigged a test by changing disabling default settings in Sophos' product. [Read More]
Cisco releases software updates to patch critical and high severity vulnerabilities in its management and security products [Read More]
A 470 gigabits per second (Gbps) distributed denial of service (DDoS) attack launched earlier this month leveraged nine different payload (packet) types. [Read More]
As it turns out, attackers use standard networking, administration and other tools in most post-intrusion activities, and not malware, a recent report from behavioral attack detection provider LightCyber reveals. [Read More]
Several vulnerabilities, including a critical remote code execution flaw, found in Cisco routers. No patch available [Read More]
AT&T detects approximately 30 billion malicious scans daily on its IP network and sees 400 million spam messages. [Read More]
IoT devices are becoming an increasingly important part of enterprise environments, yet companies continue to fail at securing them properly. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Ken McAlpine's picture
Once you have an understanding of where your security risks are, you can make better choices about what types and what sources of threat intelligence are most applicable.
Joshua Goldfarb's picture
Analytics is becoming ever more important, and in my opinion, it is an important part of the future of information security.
David Holmes's picture
The portion of encrypted traffic keeps rising, so IT security administrators will be forced to do more SSL decryption if they are to get any value at all out of their fancy security tools.
Wade Williamson's picture
Collecting security data is relatively easy – the value of security analytics solutions will rest in how well they reduce that data into answers.
Ashley Arbuckle's picture
Regardless of what industry you’re in, your ability to successfully compete in the digital economy requires the ability to securely innovate.
Emily Ratliff's picture
The Assimilation Project performs service discovery and inventory of your systems in great detail and stores the resulting data so that it can be queried.
Joshua Goldfarb's picture
The trust between those who run the security organization, and the analysts, incident responders, engineers, and others who do the work on a daily basis is extremely important.
Johnnie Konstantas's picture
When I decided to write a piece on metadata, my first thought was: How can I make this short and sweet, like metadata? My next thought: A haiku!
Alan Cohen's picture
If security can increasingly be distributed into the compute layer—effectively a form of self-protection—we begin to shift the playing field from attacker to defenders.
Ken McAlpine's picture
The emergence of IoT may finally be the technology that brings security from a network afterthought and bolt-on technology to an integral, persistent, omnipresent part of the network.