Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

IBM Security Connect is a new cloud platform that brings together data, applications and tools from over a dozen vendors [Read More]
Cybersecurity agencies in the US, UK, Canada, Australia and New Zealand release joint report on publicly available hacking tools [Read More]
Mozilla this week announced that the distrust of older Symantec certificates, initially planned for Firefox 63, will be delayed. [Read More]
Juniper Networks patches many critical and high severity vulnerabilities in Junos OS, including one that may have been triggered during malicious network probing [Read More]
D-Link patches two remote code execution and two XSS vulnerabilities in its Central WiFiManager access point management tool [Read More]
Splunk unveils Splunk for Industrial IoT, a solution designed to help organizations secure ICS, monitor and diagnose equipment, and predict downtime [Read More]
The US Justice Department's lawsuit to block a California law aimed at ensuring all online data to be treated equally sets up a legal clash over so-called "net neutrality" and the authority to regulate the internet. [Read More]
Cyberattacks leveraging the remote desktop protocol (RDP) have been on the rise for the past couple of years, fueled by the emergence of dark markets selling RDP access, the FBI warns. [Read More]
The PureVPN client for Windows is impacted by a couple of vulnerabilities that result in user credential leak, a Trustwave security researcher has discovered. [Read More]
Microsoft has released a new set of DDoS mitigation tools for Azure, which the company says will provide customers with increased visibility and support when their computing resources are under attack. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

David Holmes's picture
Forward Secrecy (sometimes called Perfect Forward Secrecy or PFS), is a cryptographic technique that adds an additional layer of confidentiality to an encrypted session, ensuring that only the two endpoints can decrypt the traffic.
Laurence Pitt's picture
The rapid proliferation of connected things is leaving networks exposed with more potential entry points that are vulnerable to attack.
Erin O’Malley's picture
SecOps and NetOps are starting to put aside their differences and find ways to work better together. As Gartner reports, these once distinct groups have begun to realize and accept that alignment is not a nice to have, but a business imperative.
John Maddison's picture
Even though a NOC or a SOC consolidates a variety of tools and measurements into a single management system, they are still too isolated.
Joshua Goldfarb's picture
The security operations workflow has grown more sophisticated and complex, and the value that most organizations get out of their SIEM deployment is far lower than it used to be.
Ashley Arbuckle's picture
Visibility, segmentation, and threat defense are foundational elements to any security strategy allowing you to reduce risk while creating new opportunities to deliver value to your customers, partners, and the organization.
Lance Cottrell's picture
Net Neutrality holds that the internet should be a passive conduit for data between any endpoints. It should not make any difference to a carrier who is initiating the connection and what service they are using.
Marie Hattar's picture
Enterprises need to rethink security to focus less on the perimeter and more on identifying anomalies in user and network behavior that may be indicators of an attack in progress.
Scott Simkin's picture
Blending in with legitimate users, attackers can infiltrate organizations and dwell inside networks for months or even years without being detected.
David Holmes's picture
Several tech vendors have been added to the list of vendors vulnerable to a variation on the Bleichenbacher attack called the ROBOT attack.