Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Microsoft’s embattled security response unit is scrambling to deal with another zero-day attack hitting users of its flagship Microsoft Office software suite. [Read More]
The social media advertising giant has shared an updated payout guideline for vulnerability hunters to better understand its bounty decisions. [Read More]
Software vendor SolarWinds failed to enable ASLR, an anti-exploitation feature available since the launch of Windows Vista 15 years ago. The oversight that made it easy for attackers to launch targeted malware attacks in July this year. [Read More]
Network detection and response play Corelight has raised a fresh $75 million funding round to speed up its global expansion ambitions. [Read More]
The two agencies warn of a noticeable increase in ransomware attacks on holidays and weekends, when offices are closed. [Read More]
The Singapore government augments its existing bug bounty program and VDP to offer bounty rewards of up to $150,000 for exceptionally impactful vulnerabilities. [Read More]
Israeli software giant Check Point joins the cybersecurity shopping spree with a definitive deal to acquire Avanan [Read More]
Report shows a vast difference in risky online behaviors between men and women: 76% of risky users are men, and only 24% are women. [Read More]
Bitdefender discovers the financially motivated threat actor FIN8 using a new potent backdoor in its malware arsenal. [Read More]
The company said it fell victim to a Conti ransomware attack that included the exfiltration of personal information pertaining to current and former employees. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Marc Solomon's picture
As you determine what security technologies to invest in, develop not only a technology roadmap, but also include and align an operational roadmap.
Derek Manky's picture
Although every network environment is unique, there are steps any organization can begin to implement now to reduce their risk from ransomware and other advanced threats.
Gordon Lawson's picture
While obscurity is an offensive tool for attackers, it also represents a defensive measure for organizations. Let’s consider the benefits of concealing network infrastructure and activity from the outside world to reduce the enterprise attack surface.
John Maddison's picture
The best defense in depth strategy is one that enables multiple tools, deployed across the distributed network—including endpoints, clouds, and applications—to work as a unified solution to detect and respond to threats.
Laurence Pitt's picture
Using Machine Learning (ML) with AI means that security tools can be trained to work better with data and the ML system will be able to make recommendations for improvements.
John Maddison's picture
In today’s highly dynamic environments, integration needs to go beyond just the security elements of a platform.
John Maddison's picture
Security tools, regardless of where they have been deployed, need to be able leverage common security intelligence feeds and share alerts and threat data with other security tools.
Derek Manky's picture
If the history of cybersecurity has taught us anything, it’s that any time that we implement a new tool, a new capability, or a new functionality, security threats follow.
Laurence Pitt's picture
In the world of information security, it’s hard to flip between internet browser tabs without hearing a new term, and one of the biggest in 2020 was Secure Access Service Edge (SASE).
John Maddison's picture
Multi-vendor environments with disparate security solutions that don’t integrate when deployed make it impossible for organizations to securely use the flexible network environments they need to compete effectively.