Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Thirty-nine cybersecurity-related M&A deals were announced in September 2022. [Read More]
Israeli startup LayerX has joined the list of companies scoring investor interest in the tricky enterprise browser market. [Read More]
In this Q&A from the SecurityWeek CISO Forum, venture capital investors discuss the state of cybersecurity investments, business strategies in a confusing economic climate, predictions on hot and not-so-hot product categories, and what happens with all those cybersecurity unicorns. [Read More]
Microsoft intercepts a Lazarus sub-group rigging popular open source software utilities to plant dangerous malware implants. [Read More]
The funding frenzy in the software supply chain space now includes Ox Security, an Israeli startup that just raised a whopping $34 million in seed funding. [Read More]
Cisco has confirmed that tens of its enterprise routers and switches are impacted by four bypass vulnerabilities in Layer-2 (L2) network security controls. [Read More]
SentinelLabs researchers are kick-starting a crowdsourced effort to understand a new mysterious APT hitting hitting telcos, ISPs and universities in the Middle East and Africa. [Read More]
The Ukrainian government is proactively warning that Russia is planning “massive cyberattacks” against critical infrastructure targets in the energy sector. [Read More]
CrowdStrike is elbowing its way into new security markets with a planned acquisition of attack surface management startup Reposify and a strategic investment in API security vendor Salt Security. [Read More]
Operant Networks has emerged from stealth mode with $3.8 million in seed funding and a Secure Access Service Edge (SASE) solution for energy operational technology (OT). [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

John Maddison's picture
Universal ZTNA is the easiest and most effective way to ensure that every user and device has secure access to the applications they need to do their jobs.
Gordon Lawson's picture
Zero trust is a great way to approach security, but we need to change the paradigm to prevent threats, instead of just detecting them.
Laurence Pitt's picture
A well-implemented ZTNA with the ‘trust-no-one, assume nothing’ mantra is also a great tool to mitigate potential attacks.
Derek Manky's picture
Organizations can strengthen their security posture by getting detailed information on current attack techniques and keeping their employees’ cyber hygiene training up to date.
Marc Solomon's picture
Security orchestration is about getting multiple systems in the Security Operations Center (SOC) to work together so you can detect, remediate and respond across the infrastructure.
John Maddison's picture
Digital acceleration, user demand, and shifting business strategies add new edges to the network, making it increasingly difficult to manage and even harder to secure.
Derek Manky's picture
Linux is becoming a more popular target for attackers as it operates the back-end systems of many networks and container-based solutions for IoT devices and mission-critical applications.
John Maddison's picture
Security systems can struggle to keep up when networks are in a constant state of flux—optimizing connections, redirecting workflows, adding new edges or endpoints, or scaling to meet shifting demands.
Derek Manky's picture
Analyzing the attack goals of adversaries is important to be able to better align defenses against the speed of changing attack techniques.
Torsten George's picture
Cyber resilience is the only way to guarantee true Zero Trust. When implemented properly, resilient Zero Trust becomes a preventive measure that counteracts human error, malicious actions, and decayed, insecure software.