Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Israel-based railway cybersecurity startup Cylus emerges from stealth mode with $4.7 million in seed funding [Read More]
Google parent Alphabet on Jan. 24 announced Chronicle, a new standalone business dedicated to cybersecurity. [Read More]
The use of compromised Internet of Things (IoT) devices to launch distributed denial of service (DDoS) attacks has helped cybercriminals increase the complexity of network-based assaults. [Read More]
A significant number of ICS and corporate systems may be exposed to remote attacks due to serious vulnerabilities in a protection and licensing software from Gemalto [Read More]
Cloudflare has announced a new service for its customers that it calls Cloudflare Access and describes as 'democratizing' Google's BeyondCorp model. [Read More]
Cisco patches high severity vulnerabilities, including privilege escalation and DoS, in email security, NX-OS and collaboration products [Read More]
Vulnerabilities allow hackers to take control of Phoenix Contact industrial switches and disrupt operations, researchers warn [Read More]
A security flaw in Intel's Advanced Management Technology (AMT) technology can be abused with less than a minute of physical access to the device to gain full remote acces. [Read More]
Free and open Certificate Authority (CA) Let’s Encrypt on Tuesday disabled TLS-SNI-01 validation after learning that users could abuse it to obtain certificates for domains they do not own. [Read More]
Exploit code used by the Satori botnet to compromise Huawei routers via a zero-day vulnerability became public last week, researchers have discovered. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Jennifer Blatnik's picture
You can slow down a hacker, but it will do you good to accept that you may never be able to truly stop someone from getting through your first line of defense.
Oliver Rochford's picture
To succeed in an era of rapidly evolving threats and emerging technology and the resulting shortfall of actionable evidence and lack of certainty, hypothesizing is the closest we can get to prediction.
Siggi Stefnisson's picture
SSL encryption can create blind spots in many organizations, as malware in the HTTPS channel is essentially hidden from most web security tools.
Alan Cohen's picture
There are different types of segmentation architectures: network centric, hypervisor centers, or distributed. Let’s take a look at each one and review the puts and takes of each approach.
Jennifer Blatnik's picture
Protecting this data is a necessity as more and more consumers are voluntarily offering up their rights to security or privacy in search for convenience.
Ashley Arbuckle's picture
Segmentation is an important element of any security strategy to mitigate risk from IoT-based attacks, but it has to be done right.
Erin O’Malley's picture
Can you see into all data across your network? Or does some data remain hidden due to silos between network and security operations teams?
David Holmes's picture
Security researchers found 26 vulnerabilities within ISP network devices that would have given them remote admin access to the majority of home networks in the United States.
Oliver Rochford's picture
Security automation is highly desirable. But this desire has been inhibited by doubt about the accuracy of the detection of threats, and fear of the consequences of automating the containment or mitigation responses.
Jennifer Blatnik's picture
Whether they come from a technical, business or even military background, all CISOs experience a number of personal and professional roadblocks on a daily basis that challenge the ultimate success of their company’s security.