Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Investors pour $65 million into an early-stage Israeli startup building technology to help businesses manage secrets like credentials, certificates and keys. [Read More]
A team of researchers has shown how a networking technology vulnerability could be exploited to hack spacecraft and other critical systems. [Read More]
Bishop Fox has raised more than $154 million in lifetime funding to build and market technology for continuous attack surface management. [Read More]
VMware slapped a critical-severity rating on the bulletin and warned that three of the patched flaws are marked with a CVSS severity score of 9.8/10. [Read More]
For the second consecutive month, Microsoft rushed out patches to cover vulnerabilities that were already exploited as zero-day in the wild, including a pair of belated fixes for exploited Microsoft Exchange Server flaws. [Read More]
Redmond warns that China-based nation state threat actors are taking advantage of a one-year-old law to “stockpile” zero-days for use in sustained malware attacks. [Read More]
The Red Cross is seeking support to create a “digital red cross/red crescent emblem” that would make clear to military and other hackers that they have entered the computer systems of medical facilities or Red Cross offices. [Read More]
Managed detection and response provider Binary Defense Systems this week announced it has raised $36 million in its first funding round. [Read More]
CISA, the FBI, and MS-ISAC have issued a joint guide to help federal agencies reduce the likelihood and impact of DDoS attacks. [Read More]
SASE provider Versa Networks announces raising $120 million in a pre-IPO funding round. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Torsten George's picture
When implemented properly, cyber resilience can be considered a preventive measure to counteract human error, malicious actions, and decayed, insecure software.
Torsten George's picture
Here are five best practices for defeating against most attacks, hopefully making the need for future Cybersecurity Awareness Months obsolete.
Marc Solomon's picture
Within the context of security operations, anticipation teams use internal and external threat and event data across their security infrastructure for context and analytics and to become more proactive.
John Maddison's picture
Universal ZTNA is the easiest and most effective way to ensure that every user and device has secure access to the applications they need to do their jobs.
Gordon Lawson's picture
Zero trust is a great way to approach security, but we need to change the paradigm to prevent threats, instead of just detecting them.
Laurence Pitt's picture
A well-implemented ZTNA with the ‘trust-no-one, assume nothing’ mantra is also a great tool to mitigate potential attacks.
Derek Manky's picture
Organizations can strengthen their security posture by getting detailed information on current attack techniques and keeping their employees’ cyber hygiene training up to date.
Marc Solomon's picture
Security orchestration is about getting multiple systems in the Security Operations Center (SOC) to work together so you can detect, remediate and respond across the infrastructure.
John Maddison's picture
Digital acceleration, user demand, and shifting business strategies add new edges to the network, making it increasingly difficult to manage and even harder to secure.
Derek Manky's picture
Linux is becoming a more popular target for attackers as it operates the back-end systems of many networks and container-based solutions for IoT devices and mission-critical applications.