Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Backup-as-a-service firm HYCU has raised $53 million in a Series B funding round led by Acrew Capital. [Read More]
Despite soaring valuations, several well-capitalized cybersecurity startups with 'unicorn' valuations are cutting staff to weather macroeconomic storms. [Read More]
SecurityWeek is publishing a daily digest summarizing some of the announcements made by vendors at the RSA Conference 2022. [Read More]
SecurityWeek is publishing a daily digest summarizing some of the announcements made by vendors at the RSA Conference 2022. [Read More]
Tech giant IBM plans to acquire early-stage attack surface management startup Randori in a deal that signals a major expansion of Big Blue’s cybersecurity ambitions. [Read More]
SecurityWeek is publishing a daily digest summarizing some of the announcements made by vendors at the RSA Conference 2022. [Read More]
Secure Access Service Edge (SASE) and Zero Trust Network Access (ZTNA) solutions provider Perimeter 81 has closed a $100 million Series C funding round led by B Capital. [Read More]
Ten Eleven Ventures has joined a growing list of cybersecurity-focused venture capital firms raising new funds to invest in startups solving information security problems. [Read More]
Sequoia is leading a massive $50 million early-stage investment in Chainguard, a startup created by a team of ex-Google software engineers to "make software supply chain secure by default." [Read More]
Cybercriminals operating the Clipminer botnet have made at least $1.7 million in illicit gains to date, according to estimates from Symantec researchers. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Gordon Lawson's picture
The rise of social engineering tactics as well as risks associated with embedded vulnerabilities in contractor networks makes keeping this technology confidential and out of the hands of adversaries increasingly difficult.
Derek Manky's picture
While the sky just may be the limit (or actually, it may not be), when it comes to cybercriminals, three key areas where we expect to see more activity in the coming year are space, digital wallets and esports.
John Maddison's picture
Security must be as agile as today's workforce, ensuring consistent protection and optimal user experience regardless of where a user or device operates.
Marie Hattar's picture
In order to deliver on the promise of 5G, we need new industry standards for security, testing, and training to proactively combat 5G cyber threats and minimize risks.
Gordon Lawson's picture
For red teams, using an obfuscated network for testing offers the advantage of hiding who is performing the attack and where it is originating, for a more real-life context
John Maddison's picture
Recent changes have resulted in a proliferation of devices and users working from anywhere, which has expanded the digital attack surface and exposed more applications, devices, data, and users to risk.
John Maddison's picture
Zero-trust network access (ZTNA) simplifies secure connectivity by providing seamless, per-use access to applications, no matter where the user or application may be located.
Torsten George's picture
While there is no silver bullet to prevent cybersecurity attacks, ZTNA has become a necessity for organizations on their digital transformation journey by allowing to minimize the attack surface while ensuring the productivity of remote workers.
John Maddison's picture
Organizations considering ZTNA should look for these three essential components as a minimum when evaluating any solution.
Torsten George's picture
As it has become clear that remote/hybrid work is here to stay, IT security practitioners must figure out how to enable a secure and resilient anywhere workforce to minimize their future risk exposure.