Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Level 3 Communications has paid an undisclosed cash sum to acquire Black Lotus, a provider of Distributed Denial of Service (DDoS) mitigation services.
Deutsche Telekom has teamed up with Intel Security to develop and deploy honey pots that can be embedded in any device, including smartphones and other connected (IoT) devices.
Cisco said on Tuesday that it would pay roughly $635 million to acquire San Francisco-based OpenDNS
Cisco warned on Thursday that as a result of default encryption keys in three of its security products, customers are at risk of an unauthenticated remote attacker being able intercept traffic or gain access to vulnerable systems with root privileges.
Security startup Menlo Security emerged from stealth armed with $25 million in funding from the closing of a Series B funding round.
Cyphort, a provider of threat detection solutions, has secured $30 million in Series C funding, bringing the total raised by the company to more than $53 million.
Fortinet has agreed to acquire Meru Networks (NASDAQ: MERU), a provider of enterprise wireless networking solutions, for roughly $44 million in cash.
Cybereason, a Cambridge, Mass.-based provider of threat detection solutions, has closed a $25 million Series B funding round, with defense contractor Lockheed Martin participating as a strategic investor.
Microsoft announced the preview version of Advanced Threat Analytics (ATA), an on-premises solution designed for detecting sophisticated attacks.
The growth of the Internet of Things and the security challenges it poses are among the security topics being discussed at the RSA Conference.

FEATURES, INSIGHTS // Network Security

rss icon

Jason Polancich's picture
In today’s cyber defense world as in other business domains, actions should speak louder than words. Yet, too often, being “actionable” is just that - a word with no meaning.
Alan Cohen's picture
Like other forms of technical debt, security debt must be paid down, which ultimately leads to a more agile and secure enterprise.
Wade Williamson's picture
While malware is obviously a critically important tool in the attacker’s arsenal, it is just one of many that make sophisticated attacks successful.
David Holmes's picture
Whether Shodan's John Matherly intends it to or not, Shodan is already exposing the sham of consumer-grade security that we all suspected would be a hallmark of The Internet of Things.
Rafal Los's picture
Often times it’s the insiders that enable the external attacker – either willingly or otherwise, and the result can be even more devastating than that of an external attacker.
Travis Greene's picture
Can IT security find a way to coexist with wearables faster than the first BYOD war and avoid a second war?
Scott Simkin's picture
In the moments after a breach, security teams will often focus on the event itself, but not draw additional insight from the attack, or analyze the events surrounding it.
Rebecca Lawson's picture
Although technology products are time and time again heavily relied on and placed at the forefront of defense, there is another critical element that needs just as much focus: training the next generation of technology professionals.
Alan Cohen's picture
Just as enterprise computing is having a DevOps moment, much of the security profession has woken up to the fact they are mired in the traditional infrastructure and silo approach.
Marc Solomon's picture
Just as the graduating class of 2015 will evolve how they operate to realize their full potential in the real world, we must evolve our approach to security in the Digital Economy.