Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

San Jose, Calif-based network threat detection and response firm Vectra has closed a $100 million Series E funding round led by TCV and supported by existing investors. [Read More]
The GoldBrute botnet is launching brute-force attacks against Windows severs with the remote desktop protocol (RDP) exposed to the Internet. [Read More]
A BGP route leak resulted in large portions of European Internet traffic being routed through China Telecom’s network for two hours on June 6, 2019. [Read More]
Cisco has found several vulnerabilities, including one code execution flaw, in its Industrial Network Director product. [Read More]
Experts say that deception technology works and it’s one of the last bastions of active asymmetrical defense that we have to help blue teams start to gain ground on defending their organizations. [Read More]
Serious vulnerabilities have been found and patched in the Kace K1000 systems management appliance from Quest (formerly offered by Dell). [Read More]
AttackIQ, a company that specializes in continuous security validation, raised $17.6 million in a Series B funding round, which brings the total raised by the firm to roughly $35 million. [Read More]
Autonomous threat hunting company Hunters.AI emerges from stealth mode with $5.4 million in seed funding. [Read More]
Tenable this week announced Nessus Essentials, an expanded version of its free vulnerability assessment solution previously known as Nessus Home. [Read More]
Cisco has released patches for numerous vulnerabilities affecting its products, including Critical flaws in Prime Infrastructure (PI) Software that could lead to remote code execution. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Torsten George's picture
Using Zero Trust Privilege services can extend corporate security policies and best practices to cloud environments, while reducing costs, improving scalability across multi-VPCs, -SaaS, and -directory environments, and minimizing security blind spots through centralized management.
Danelle Au's picture
Deep learning is an ideal technology to address the volume and velocity of the current threat environment, and can be used to detect a variety of different threats, even ones that seemingly look novel.
John Maddison's picture
Enabling the networks of tomorrow requires organizations to radically reimagine the security solutions they have in place today.
Laurence Pitt's picture
Well deployed automation – a combination of orchestration tools, data leveraged for analytics, machine-learning and artificial intelligence – can provide an edge for an enterprise in today’s ever evolving 24/7 threat landscape.
Gunter Ollmann's picture
75 years may separate War World II from cloud SIEM, but we’re on the cusp of being able to apply the hard-earned learnings from Abraham Wald in our latest adversarial conflict – the cyberwar.
Torsten George's picture
Shifting traditional perimeter-based enterprise security strategies to a Zero Trust approach provides more robust prevention, detection, and incident response capabilities to protect continuously expanding attack surfaces.
Ashley Arbuckle's picture
As organizations digitize their business and make these shifts, they need to know what and who they can trust.
John Maddison's picture
While maintaining consistent network visibility and control is table stakes for any security strategy, they are becoming increasingly difficult to maintain.
Ashley Arbuckle's picture
Through market consolidation, organizations can derive exponentially more value from their security tools.
Ashley Arbuckle's picture
Network Segmentation can prevent lateral movement and effectively improve security, and is a continuous journey that every organization should take.