Security Experts:

long dotted


Hackers continue to look for Pulse Secure and Fortinet devices affected by recently disclosed flaws, but both companies have taken steps to protect customers. [Read More]
A researcher has disclosed details and created Metasploit modules for Cisco UCS vulnerabilities that can be exploited to take complete control of affected systems. [Read More]
VMware announces significant enhancements, including in security, to its Virtual Cloud Network offering. [Read More]
Cisco announced on Wednesday that it patched 17 critical and high-severity vulnerabilities in some of its Unified Computing products. [Read More]
AWS has reached out to customers reportedly targeted by the Capital One hacker, but says none of them reported any significant issues. [Read More]
The Mutually Agreed Norms for Routing Security (MANRS) project launches Observatory, a free tool designed to help network operators improve routing security. [Read More]
Broadcom agreed to acquire the enterprise unit of cybersecurity firm Symantec Corp. for $10.7 billion in a move to further diversify the US semiconductor maker. [Read More]
Cisco released patches to address several vulnerabilities in its Small Business 220 Series Smart Switches, including two bugs rated Critical severity. [Read More]
An unprotected, internet accessible ElasticSearch database exposed 40GB of sensitive data from Honda Motor Company, containing technical details on employee computers, including its CEO, [Read More]
Palo Alto, California-based start-up Confluera has simultaneously announced a Series A funding round of $9 million and the launch of its new Real-time Attack Interception and Defense (RAID) platform. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Gunter Ollmann's picture
75 years may separate War World II from cloud SIEM, but we’re on the cusp of being able to apply the hard-earned learnings from Abraham Wald in our latest adversarial conflict – the cyberwar.
Torsten George's picture
Shifting traditional perimeter-based enterprise security strategies to a Zero Trust approach provides more robust prevention, detection, and incident response capabilities to protect continuously expanding attack surfaces.
Ashley Arbuckle's picture
As organizations digitize their business and make these shifts, they need to know what and who they can trust.
John Maddison's picture
While maintaining consistent network visibility and control is table stakes for any security strategy, they are becoming increasingly difficult to maintain.
Ashley Arbuckle's picture
Through market consolidation, organizations can derive exponentially more value from their security tools.
Ashley Arbuckle's picture
Network Segmentation can prevent lateral movement and effectively improve security, and is a continuous journey that every organization should take.
John Maddison's picture
Security frameworks need to see and adapt to network changes, share and correlate threat intelligence, and respond to threats as a unified system.
Devon Kerr's picture
To take advantage of the MITRE ATT&CK matrix, you must accept and prioritize the importance of visibility within your security operation.
Ashley Arbuckle's picture
Network segmentation can be challenging to implement, scale, and manage. But, you shouldn’t let this reality prevent you from moving forward.
John Maddison's picture
In an SD-WAN environment, security needs to not only protect data and resources, but also ensure that performance and controlling costs are preserved.