Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Secure Access Service Edge (SASE) and Network-as-a-Service (NaaS) solutions provider Perimeter 81 has closed a $40 million Series B funding round that brings the total raised by the company to $65 million. [Read More]
GreyNoise Intelligence, a startup focused on helping security teams reduce alert fatigue, has raised $4.8 million in seed investment to help the company expand its intelligence service that helps teams “prioritize alerts that matter by quieting ones that don’t.” [Read More]
Cisco has patched critical and high-severity vulnerabilities in its Data Center Network Manager (DCNM) product. [Read More]
The US ambassador in Brasilia warned of "consequences" if Brazil chooses Chinese telecoms company Huawei to develop its 5G network. [Read More]
The United States and the United Kingdom warned in a joint alert issued this week that a piece of malware has infected over 62,000 QNAP NAS devices. [Read More]
Department of Energy (DOE) officials issued a report that lays out a blueprint strategy for the development of a national quantum internet. [Read More]
Hackers started exploiting a path traversal vulnerability in Cisco firewalls shortly after it was patched and disclosed. [Read More]
Cybersecurity company Fortinet has acquired Secure Access Service Edge (SASE) cloud provider OPAQ Networks. [Read More]
Cisco has patched several critical vulnerabilities that can be exploited to hack small business routers that are no longer being sold. [Read More]
Cisco has launched an investigation after F-Secure discovered two counterfeit Cisco switches that appear to exploit a previously unknown vulnerability. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

John Maddison's picture
Physical and virtual security appliances traditionally suffer from performance challenges, especially when it comes to critical functions such as inspecting encrypted traffic.
John Maddison's picture
Outpacing your security capacity with digital innovation is a formula for disaster that may take you out of the running in today’s highly competitive digital marketplace entirely.
Craig Harber's picture
Deep visibility allows organizations to see how different pieces of the overall cyber terrain are communicating with one another, enabling them to highlight potential or existing attack vectors.
Justin Fier's picture
Use of artificial intelligence (AI) will change the role of security teams, and improve companies’ ability to defend their data and networks from future compromises, breaches, and sabotage.
Craig Harber's picture
By using decoys to capture adversary tools, understand their techniques, and detect their actions during early attack phases, security teams can detect problems sooner and avoid long dwell times.
Laurence Pitt's picture
DDoS attacks are moving away from simply sending out broadcast traffic for massive disruption toward more complex and targeted attacks hitting the application layer of the network that can take down specific applications or services.
Craig Harber's picture
Cybersecurity teams need actionable insight into the latest techniques, tactics and procedures being used by attackers and a continuous understanding of their environment and anomalous behavior.
Laurence Pitt's picture
The best way to stay ahead of threats while enabling business agility to keep up with the latest technology advances is to look to the network as the first line of defense.
Justin Fier's picture
The arrival of 5G will fuel an explosion of never-before-seen IoT machines, introducing uncharted vulnerabilities and opening the door for cyber-criminals to compromise our increasingly intertwined cities.
Craig Harber's picture
Because attackers will exploit the paths of least resistance and move laterally through the enterprise, visibility must include all managed and unmanaged assets (enterprise IoT, shadow IoT, legacy systems, etc.)