Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A bill introduced by Senator Tom Cotton would ban the sharing of intelligence with countries that use Huawei technologies in their 5G networks. [Read More]
Serious vulnerabilities found by a researcher in Cisco Data Center Network Manager can be chained for high-impact attacks. [Read More]
PoC exploits have been released for remote command execution and information disclosure vulnerabilities affecting many D-Link routers. [Read More]
Firefox users will be getting private and secure encrypted Domain Name System (DNS) services from NextDNS, after Mozilla added the company to its Trusted Recursive Resolver (TRR) program. [Read More]
Critical infrastructure protection company OPSWAT acquires Network Access Control (NAC) and Software Defined Perimeter (SDP) solutions provider Impulse. [Read More]
Germany-based industrial connectivity solutions provider Weidmueller has released firmware updates for many of its managed industrial Ethernet switches to address critical vulnerabilities. [Read More]
Cloudflare this week announced the open source availability of Flan Scan, its lightweight network vulnerability scanner. [Read More]
ZecOps, a San Francisco-based threat detection and security automation company, has secured a total of $10.2 million through a seed funding round. [Read More]
Israeli cybersecurity firm Pcysys has completed a $10 million Series A funding round, which brings the total raised by the company to $15 million. [Read More]
Automation can eliminate misconfigurations, increase security agility while maximizing efficiency and reducing operational costs, and prevent compliance violations. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

John Maddison's picture
Security-Driven Networking is a new, strategic approach to security that enables the seamless expansion of network environments and services without ever compromising on security.
Laurence Pitt's picture
Adoption of 5G not only exposes potential new attack surfaces, but given execution happens at super-speed, it also changes the required nature of any defense.
John Maddison's picture
Many cybersecurity companies claim to have introduced AI capabilities into their solutions, but most fall short of true AI because their underlying infrastructure is too small or their learning models are incomplete.
Ashley Arbuckle's picture
While we can’t turn our attention away from gathering data, we must devise new ways to deal with the onslaught of data. Humans simply can’t keep up, and the problem is getting worse.
Ashley Arbuckle's picture
Breach and Attack Simulation (BAS) tools aid in maintaining a fundamental level of security assurance more quickly and cost effectively than traditional approaches.
John Maddison's picture
Analyzing threat trends can provide security professionals with insights into how to better protect their organizations from the latest cyber threats.
Gunter Ollmann's picture
While cloud SIEM may be new for most organizations, its ability to harness the innate capabilities of public cloud are transforming security operations.
Laurence Pitt's picture
While security spending is on the increase, it’s up to us as experienced security practitioners to make the most of this spend with a clear ROI that can be reported to the business.
Torsten George's picture
Using Zero Trust Privilege services can extend corporate security policies and best practices to cloud environments, while reducing costs, improving scalability across multi-VPCs, -SaaS, and -directory environments, and minimizing security blind spots through centralized management.
Danelle Au's picture
Deep learning is an ideal technology to address the volume and velocity of the current threat environment, and can be used to detect a variety of different threats, even ones that seemingly look novel.