Security Experts:

long dotted


Bug bounty hunters have hacked routers, NAS devices and TVs at the Pwn2Own Tokyo 2020 hacking competition. [Read More]
A newly identified attack method can bypass NATs and firewalls, allowing the attacker to remotely access TCP/UDP services on the victim’s internal network. [Read More]
Lucidum, an asset discovery startup that aims to eliminate blind spots in IT, cloud and security operations, launched on Friday with $4 million in seed funding. [Read More]
Google has revealed that its infrastructure was targeted in a record-breaking 2.5 Tbps DDoS attack in 2017. [Read More]
Juniper Networks informed customers this week that it has patched tens of vulnerabilities, including serious issues that can be exploited to take control of affected systems. [Read More]
Cloudflare announces Cloudflare One, a new cloud-based network-as-a-service solution designed to help organizations ensure that their systems remain secure while their employees work remotely. [Read More]
Network security company Illusive Networks has raised $24 million in a Series B1 funding round. [Read More]
New additions to Juniper's portfolio are designed to provide that visibility and control by bringing security to every point of connection and allowing CISOs to know who and what is on the network. [Read More]
The Internet Engineering Task Force (IETF) has published RFC8915, its proposed standard for network time security (NTS). [Read More]
Google this week announced the availability of Chronicle Detect, a threat detection solution for enterprises from Google Cloud. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

AJ Nash's picture
Knowing that threat intelligence is readily available and proving its worth is one thing, understanding how to use it within your security operations program is quite another.
Laurence Pitt's picture
To reap the benefits of 5G and ensure security, organizations must be smarter, fully educated and willing to work alongside the tech.
John Maddison's picture
SD-WAN connections are designed to constantly shift and adjust, replacing one connection that has become unstable with another without interrupting application performance.
Gunter Ollmann's picture
The phrase “assume breach” has been transformational to enterprise security investment and defensive strategy for a few years but may now be close to retirement.
Laurence Pitt's picture
To minimize the effect of an attack, an automated response is vital, which can reduce the amount of time between infection and resolution.
John Maddison's picture
By combining verifiable trust, intent-based segmentation, and integrated security, organizations can establish a trustworthy, security-driven networking strategy.
John Maddison's picture
Smart businesses are learning that SD-WAN can play a critical role in quickly—and securely—rolling out new networking environments, and connecting resources and users to data and applications.
Laurence Pitt's picture
Every business is likely to be subject to cyberattacks at some point, and the option is to either take on the cost of putting measures in place before it happens or paying to clean up after.
John Maddison's picture
The rate at which recent networking changes have had to occur, and the speed at which cybercriminals have been able to respond, teach us clearly what is needed going forward to ensure ongoing proactive cyber protection.
Laurence Pitt's picture
For an MSP looking to grow business, the convergence of SD-WAN and security, along with the transitional needs of customers, translates to opportunity.