Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Outdated and unsupported operating systems are still present and they still pose a serious risk in many industrial organizations. [Read More]
A critical vulnerability allows remote, unauthenticated attackers to gain unauthorized access to Cisco Aironet access points with elevated privileges. [Read More]
A critical vulnerability patched by Sophos in its Cyberoam firewall appliances allows a remote, unauthenticated attacker to execute arbitrary commands with root privileges. [Read More]
A critical remote code execution vulnerability in several D-Link routers that reached their end of life remains unpatched. [Read More]
NIST has published a draft Zero Trust Architecture (ZTA) special publication (SP.800.207) to develop a technology-neutral lexicon of the logical components of a zero trust strategy. [Read More]
Threat intelligence firm Anomali unveils Lens, a new tool that makes it easy for organizations to find and use threat data from news articles, blogs, security bulletins, logs and social networks. [Read More]
One of the financially motivated threat actors operating under the Magecart umbrella appears to be testing malicious code to inject into commercial-grade layer 7 (L7) routers. [Read More]
A critical vulnerability affecting D-Link DNS-320 NAS devices can be exploited remotely from the internet to take complete control of the system and the files stored on it. [Read More]
Researchers discover 125 vulnerabilities across 13 SOHO routers and NAS devices as part of a research project dubbed SOHOpelessly Broken 2.0. [Read More]
NETGEAR patches DoS vulnerabilities found by Cisco researchers in its N300 series wireless routers. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

John Maddison's picture
Analyzing threat trends can provide security professionals with insights into how to better protect their organizations from the latest cyber threats.
Gunter Ollmann's picture
While cloud SIEM may be new for most organizations, its ability to harness the innate capabilities of public cloud are transforming security operations.
Laurence Pitt's picture
While security spending is on the increase, it’s up to us as experienced security practitioners to make the most of this spend with a clear ROI that can be reported to the business.
Torsten George's picture
Using Zero Trust Privilege services can extend corporate security policies and best practices to cloud environments, while reducing costs, improving scalability across multi-VPCs, -SaaS, and -directory environments, and minimizing security blind spots through centralized management.
Danelle Au's picture
Deep learning is an ideal technology to address the volume and velocity of the current threat environment, and can be used to detect a variety of different threats, even ones that seemingly look novel.
John Maddison's picture
Enabling the networks of tomorrow requires organizations to radically reimagine the security solutions they have in place today.
Laurence Pitt's picture
Well deployed automation – a combination of orchestration tools, data leveraged for analytics, machine-learning and artificial intelligence – can provide an edge for an enterprise in today’s ever evolving 24/7 threat landscape.
Gunter Ollmann's picture
75 years may separate War World II from cloud SIEM, but we’re on the cusp of being able to apply the hard-earned learnings from Abraham Wald in our latest adversarial conflict – the cyberwar.
Torsten George's picture
Shifting traditional perimeter-based enterprise security strategies to a Zero Trust approach provides more robust prevention, detection, and incident response capabilities to protect continuously expanding attack surfaces.
Ashley Arbuckle's picture
As organizations digitize their business and make these shifts, they need to know what and who they can trust.