Security Experts:

long dotted


Cisco has patched critical and high severity authentication bypass, code execution, and file upload/download vulnerabilities in Data Center Network Manager. [Read More]
Vulcan Cyber, an Israel-based startup that specializes in vulnerability remediation solutions, raised $10 million in a Series A funding round. [Read More]
Indegy announces general availability of CIRRUS, an industrial cybersecurity-as-a-service (ICSaaS) offering. [Read More]
Cisco patches critical and high severity vulnerabilities in SD-WAN, DNA Center, TelePresence, StarOS, RV router, Prime Service Catalog, and Meeting Server products. [Read More]
A critical remote code execution vulnerability allows an unauthenticated hacker to take complete control of some TP-Link Wi-Fi extenders. Firmware updates are available. [Read More]
Several serious vulnerabilities have been found by a researcher in WAGO 852 industrial managed switches. [Read More]
Microsegmentation provider Edgewise Networks has secured $11 million in new funding round. To date, the company has raised $18 million. [Read More]
San Jose, Calif-based network threat detection and response firm Vectra has closed a $100 million Series E funding round led by TCV and supported by existing investors. [Read More]
The GoldBrute botnet is launching brute-force attacks against Windows severs with the remote desktop protocol (RDP) exposed to the Internet. [Read More]
A BGP route leak resulted in large portions of European Internet traffic being routed through China Telecom’s network for two hours on June 6, 2019. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Torsten George's picture
Shifting traditional perimeter-based enterprise security strategies to a Zero Trust approach provides more robust prevention, detection, and incident response capabilities to protect continuously expanding attack surfaces.
Ashley Arbuckle's picture
As organizations digitize their business and make these shifts, they need to know what and who they can trust.
John Maddison's picture
While maintaining consistent network visibility and control is table stakes for any security strategy, they are becoming increasingly difficult to maintain.
Ashley Arbuckle's picture
Through market consolidation, organizations can derive exponentially more value from their security tools.
Ashley Arbuckle's picture
Network Segmentation can prevent lateral movement and effectively improve security, and is a continuous journey that every organization should take.
John Maddison's picture
Security frameworks need to see and adapt to network changes, share and correlate threat intelligence, and respond to threats as a unified system.
Devon Kerr's picture
To take advantage of the MITRE ATT&CK matrix, you must accept and prioritize the importance of visibility within your security operation.
Ashley Arbuckle's picture
Network segmentation can be challenging to implement, scale, and manage. But, you shouldn’t let this reality prevent you from moving forward.
John Maddison's picture
In an SD-WAN environment, security needs to not only protect data and resources, but also ensure that performance and controlling costs are preserved.
Torsten George's picture
While implementing Zero Trust is a journey that cannot be achieved over night, it also doesn’t require a complete redesign of existing network architectures.