Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

AWS launches Security Hub, a service that aggregates and prioritizes security alerts from both AWS and third-party security tools [Read More]
Vulnerabilities TP-Link recently addressed in the TL-R600VPN small and home office (SOHO) router could lead to remote code execution, Cisco Talos security researchers warn. [Read More]
Google services inaccessible for some users as a result of a BGP leak that caused traffic to be directed through Russia, China and Nigeria. Unclear if it was a configuration issue or a malicious act [Read More]
A default account exposes Cisco Small Business switches to remote attacks. No patch available, but there is a workaround [Read More]
Over the past years, China Telecom has been constantly misdirecting Internet traffic through China, researchers say. [Read More]
Symantec acquires mobile application security firm Appthority and Javelin Networks, a company specializing in Active Directory (AD) security [Read More]
Shape Security, a provider of bot protection and anti-automation solutions, has raised $26 million in growth capital, bringing the total raised by the company to $132 million. [Read More]
BLEEDINGBIT: Millions of enterprise access points and other network devices may be exposed to remote attacks due to vulnerabilities in Bluetooth Low Energy (BLE) chips made by Texas Instruments [Read More]
Cisco recently discovered that some of its security appliances are affected by an actively exploited DoS zero-day vulnerability [Read More]
The newly discovered DemonBot botnet is targeting Hadoop clusters in an attempt to leverage their computing power to launch distributed denial of service (DDoS) attacks. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Marie Hattar's picture
In the ever more complicated world of modern IT networks, visibility is the increasingly pressing challenge that security teams need to solve to stop cyber attacks.
Marc Solomon's picture
Adversaries are increasingly masterful at taking advantage of these seams between technologies and teams to infiltrate organizations and remain below the radar.
Marie Hattar's picture
A big part of making autonomous driving accessible will be the ability for car makers and suppliers to secure the networks that power these increasingly sophisticated vehicles.
John Maddison's picture
Given the growth of sophisticated and pervasive threats and malware, extra caution must be taken to compensate for the security protections inherent in traditional MPLS connections.
Stan Engelbrecht's picture
These seven processes should be automated in order to save valuable time during incident response and security investigation procedures, and help organizations improve their overall cybersecurity posture.
John Maddison's picture
To ensure that your existing IPS solution doesn’t become a weak link in your security strategy, you should be constantly tracking and evaluating its effectiveness—especially older, legacy solutions.
Torsten George's picture
By implementing these measures organizations can limit their exposure to remote access-based cyber threats, while supporting agile business models such as remote work and outsourced IT.
Joshua Goldfarb's picture
In security, one of our goals should always be to broaden our perspective, field of view, and horizons to minimize the risk that we will be blindsided by something we didn’t see coming.
Joshua Goldfarb's picture
When an organization controls its security technology portion size, it enables the organization to better address strategic requirements and to work far more efficiently.
Stan Engelbrecht's picture
The principles of automation and orchestration are necessary to counter the skills and resource gap, and their impact is amplified when applied across the broader picture of cybersecurity, compliance, risk and case management.