Security Experts:

long dotted


Palo Alto Networks has agreed to acquire Security Orchestration, Automation and Response (SOAR) firm Demisto, in a deal valued at $560 million. [Read More]
Micro Focus is expanding its cybersecurity portfolio with the acquisition of cyber-threat protection company Interset. [Read More]
Offensive Security announces the release of Kali Linux 2019.1, which patches bugs and updates Metasploit to version 5.0. [Read More]
The UK's National Cyber Security Centre (NCSC) sees ways of limiting risks from using Huawei in future 5G networks, according to two unnamed sources. [Read More]
Cybersecurity asset management company Axonius this week announced that it has raised $13 million in a Series A funding round led by Bessemer Venture Partners. [Read More]
The latest version of Chrome OS puts the Shill network manager in a sandbox and removes its root privileges. [Read More]
An industrial gateway made by Germany-based Kunbus is affected by serious vulnerabilities that can be exploited to gain complete control of a device. [Read More]
Fortinet this week announced new FortiGate Next-Generation Firewalls (NGFWs), designed to help customers improve security through implementing Intent-based Segmentation. [Read More]
Netography, a network security solutions provider founded by DDoS mitigation and network security experts, emerges from stealth with $2.6 million in seed funding. [Read More]
Researchers discover over two dozen RDP vulnerabilities, including ones that allow a malicious RDP server to hack a device running the client RDP software. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

John Maddison's picture
Given the growth of sophisticated and pervasive threats and malware, extra caution must be taken to compensate for the security protections inherent in traditional MPLS connections.
Stan Engelbrecht's picture
These seven processes should be automated in order to save valuable time during incident response and security investigation procedures, and help organizations improve their overall cybersecurity posture.
John Maddison's picture
To ensure that your existing IPS solution doesn’t become a weak link in your security strategy, you should be constantly tracking and evaluating its effectiveness—especially older, legacy solutions.
Torsten George's picture
By implementing these measures organizations can limit their exposure to remote access-based cyber threats, while supporting agile business models such as remote work and outsourced IT.
Joshua Goldfarb's picture
In security, one of our goals should always be to broaden our perspective, field of view, and horizons to minimize the risk that we will be blindsided by something we didn’t see coming.
Joshua Goldfarb's picture
When an organization controls its security technology portion size, it enables the organization to better address strategic requirements and to work far more efficiently.
Stan Engelbrecht's picture
The principles of automation and orchestration are necessary to counter the skills and resource gap, and their impact is amplified when applied across the broader picture of cybersecurity, compliance, risk and case management.
Marie Hattar's picture
Stopping DDoS attacks is not a matter of improving security of IoT devices. Enterprises need to take responsibility and be better at identifying and preventing DDoS attacks as they happen in real time.
David Holmes's picture
Forward Secrecy (sometimes called Perfect Forward Secrecy or PFS), is a cryptographic technique that adds an additional layer of confidentiality to an encrypted session, ensuring that only the two endpoints can decrypt the traffic.
Laurence Pitt's picture
The rapid proliferation of connected things is leaving networks exposed with more potential entry points that are vulnerable to attack.