Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Threat hunting solutions provider Hunters today announced that it closed a $15 million Series A funding round, which brings the total raised by the company to $20.4 million. [Read More]
Many companies view the SOC as a key part of their security strategy, but SOC staff complain about high stress and the lack of proper tools. [Read More]
IBM has disclosed several vulnerabilities affecting powerline extenders from Tenda and says the vendor has ignored its emails and phone calls. [Read More]
Apple has acquired Fleetsmith, a company that specializes in solutions that automate the setup, patching and security of Macs, iPhones, iPads and Apple TV devices. [Read More]
Applying micro-segmentation to endpoints can help stop attackers from moving laterally within an organization after the initial breach. [Read More]
A high-severity vulnerability found in IBM’s Maximo asset management product makes it easier for hackers to move around in enterprise networks. [Read More]
Palo Alto Networks has unveiled a new ML-powered firewall, a firewall for Kubernetes, and an IoT security solution. [Read More]
AI company SparkCognition and German industrial giant Siemens have teamed up to offer an industrial security solution for energy companies. [Read More]
Threat detection firm Vectra has integrated its network threat detection and response (NDR) Cognito platform with Microsoft Defender and Microsoft Azure Sentinel. [Read More]
A vulnerability related to the IP-in-IP tunneling protocol that can be exploited for DoS attacks and to bypass security controls has been found to impact devices from Cisco and other vendors. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

John Maddison's picture
Outpacing your security capacity with digital innovation is a formula for disaster that may take you out of the running in today’s highly competitive digital marketplace entirely.
Craig Harber's picture
Deep visibility allows organizations to see how different pieces of the overall cyber terrain are communicating with one another, enabling them to highlight potential or existing attack vectors.
Justin Fier's picture
Use of artificial intelligence (AI) will change the role of security teams, and improve companies’ ability to defend their data and networks from future compromises, breaches, and sabotage.
Craig Harber's picture
By using decoys to capture adversary tools, understand their techniques, and detect their actions during early attack phases, security teams can detect problems sooner and avoid long dwell times.
Laurence Pitt's picture
DDoS attacks are moving away from simply sending out broadcast traffic for massive disruption toward more complex and targeted attacks hitting the application layer of the network that can take down specific applications or services.
Craig Harber's picture
Cybersecurity teams need actionable insight into the latest techniques, tactics and procedures being used by attackers and a continuous understanding of their environment and anomalous behavior.
Laurence Pitt's picture
The best way to stay ahead of threats while enabling business agility to keep up with the latest technology advances is to look to the network as the first line of defense.
Justin Fier's picture
The arrival of 5G will fuel an explosion of never-before-seen IoT machines, introducing uncharted vulnerabilities and opening the door for cyber-criminals to compromise our increasingly intertwined cities.
Craig Harber's picture
Because attackers will exploit the paths of least resistance and move laterally through the enterprise, visibility must include all managed and unmanaged assets (enterprise IoT, shadow IoT, legacy systems, etc.)
John Maddison's picture
Security-Driven Networking is a new, strategic approach to security that enables the seamless expansion of network environments and services without ever compromising on security.