Security Experts:

long dotted


U.K. telecom companies won't be allowed to install Huawei equipment in their high-speed 5G networks after September 2021, the British government said Nov. 30, 2020, hardening its line against the Chinese technology company. [Read More]
More than fifty networks in the North American region suddenly burst to life after being dormant for a long period of time, Spamhaus reveals. [Read More]
Secure Access Service Edge (SASE) provider Cato Networks has raised $130 million in a Series E funding round led by Lightspeed Venture Partners. [Read More]
VMware has patched several vulnerabilities in its SD-WAN Orchestrator product, including flaws that can be exploited to steer traffic or shut down enterprise networks. [Read More]
Barracuda Networks has acquired Fyde, a provider of Zero Trust Network Access (ZTNA) solutions. [Read More]
Palo Alto Networks has agreed to acquire attack surface management firm Expanse in a deal valued at roughly $800 million. [Read More]
Bug bounty hunters have earned a total of over $1.2 million at a major Chinese hacking competition, including $180,000 for iPhone exploits and $100,000 for Chrome exploits. [Read More]
Bug bounty hunters have hacked routers, NAS devices and TVs at the Pwn2Own Tokyo 2020 hacking competition. [Read More]
A newly identified attack method can bypass NATs and firewalls, allowing the attacker to remotely access TCP/UDP services on the victim’s internal network. [Read More]
Lucidum, an asset discovery startup that aims to eliminate blind spots in IT, cloud and security operations, launched on Friday with $4 million in seed funding. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Laurence Pitt's picture
Every business is likely to be subject to cyberattacks at some point, and the option is to either take on the cost of putting measures in place before it happens or paying to clean up after.
John Maddison's picture
The rate at which recent networking changes have had to occur, and the speed at which cybercriminals have been able to respond, teach us clearly what is needed going forward to ensure ongoing proactive cyber protection.
Laurence Pitt's picture
For an MSP looking to grow business, the convergence of SD-WAN and security, along with the transitional needs of customers, translates to opportunity.
John Maddison's picture
Network connections that can change instantaneously in response to shifting business requirements can take a security solution minutes or hours to be reconfigured. And that lag time is prime for exploitation.
Laurence Pitt's picture
Working remotely should be a positive experience. Here are a few simple suggestions that may help during this time of change.
Craig Harber's picture
Many organizations are not aware that their network sensors are improperly or inefficiently deployed because they do not have a full understanding of how to act on the network traffic being collected.
John Maddison's picture
Physical and virtual security appliances traditionally suffer from performance challenges, especially when it comes to critical functions such as inspecting encrypted traffic.
John Maddison's picture
Outpacing your security capacity with digital innovation is a formula for disaster that may take you out of the running in today’s highly competitive digital marketplace entirely.
Craig Harber's picture
Deep visibility allows organizations to see how different pieces of the overall cyber terrain are communicating with one another, enabling them to highlight potential or existing attack vectors.
Justin Fier's picture
Use of artificial intelligence (AI) will change the role of security teams, and improve companies’ ability to defend their data and networks from future compromises, breaches, and sabotage.