Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Google services inaccessible for some users as a result of a BGP leak that caused traffic to be directed through Russia, China and Nigeria. Unclear if it was a configuration issue or a malicious act [Read More]
A default account exposes Cisco Small Business switches to remote attacks. No patch available, but there is a workaround [Read More]
Over the past years, China Telecom has been constantly misdirecting Internet traffic through China, researchers say. [Read More]
Symantec acquires mobile application security firm Appthority and Javelin Networks, a company specializing in Active Directory (AD) security [Read More]
Shape Security, a provider of bot protection and anti-automation solutions, has raised $26 million in growth capital, bringing the total raised by the company to $132 million. [Read More]
BLEEDINGBIT: Millions of enterprise access points and other network devices may be exposed to remote attacks due to vulnerabilities in Bluetooth Low Energy (BLE) chips made by Texas Instruments [Read More]
Cisco recently discovered that some of its security appliances are affected by an actively exploited DoS zero-day vulnerability [Read More]
The newly discovered DemonBot botnet is targeting Hadoop clusters in an attempt to leverage their computing power to launch distributed denial of service (DDoS) attacks. [Read More]
Arctic Wolf Networks has raised $45 million in series C funding led by Future Fund. The company has raised a total of $91.2 million to-date. [Read More]
Cisco patches high severity command injection flaw in WebEx. The researchers who found the vulnerability named it WebExec and made its details public [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Joshua Goldfarb's picture
In security, one of our goals should always be to broaden our perspective, field of view, and horizons to minimize the risk that we will be blindsided by something we didn’t see coming.
Joshua Goldfarb's picture
When an organization controls its security technology portion size, it enables the organization to better address strategic requirements and to work far more efficiently.
Stan Engelbrecht's picture
The principles of automation and orchestration are necessary to counter the skills and resource gap, and their impact is amplified when applied across the broader picture of cybersecurity, compliance, risk and case management.
Marie Hattar's picture
Stopping DDoS attacks is not a matter of improving security of IoT devices. Enterprises need to take responsibility and be better at identifying and preventing DDoS attacks as they happen in real time.
David Holmes's picture
Forward Secrecy (sometimes called Perfect Forward Secrecy or PFS), is a cryptographic technique that adds an additional layer of confidentiality to an encrypted session, ensuring that only the two endpoints can decrypt the traffic.
Laurence Pitt's picture
The rapid proliferation of connected things is leaving networks exposed with more potential entry points that are vulnerable to attack.
Erin O’Malley's picture
SecOps and NetOps are starting to put aside their differences and find ways to work better together. As Gartner reports, these once distinct groups have begun to realize and accept that alignment is not a nice to have, but a business imperative.
John Maddison's picture
Even though a NOC or a SOC consolidates a variety of tools and measurements into a single management system, they are still too isolated.
Joshua Goldfarb's picture
The security operations workflow has grown more sophisticated and complex, and the value that most organizations get out of their SIEM deployment is far lower than it used to be.
Ashley Arbuckle's picture
Visibility, segmentation, and threat defense are foundational elements to any security strategy allowing you to reduce risk while creating new opportunities to deliver value to your customers, partners, and the organization.