Security Experts:

long dotted


Several vulnerabilities, including ones rated critical, have been found in SICLOCK central plant clocks from Siemens. Only mitigations have been provided as the affected devices are being phased out [Read More]
Threat detection and response firm Cynet raises $13 million in a series B funding round, bringing the total raised by the company to date to $20 million [Read More]
Simple Service Discovery Protocol (SSDP) can be abused to launch a new type of DDoS attacks where devices respond with a non-standard port [Read More]
Cisco warns that a recently patched vulnerability affecting Adaptive Security Appliance (ASA) software has been exploited in DoS attacks. PoC exploits and details are public [Read More]
Wi-Fi Alliance has launched the WPA3 security standard for personal and enterprise use, along with a new program that makes it easy to add IoT devices to a wireless network. [Read More]
Difficult to detect, hidden tunnels are used by attackers to evade strong access controls, firewalls and intrusion detection systems. [Read More]
Cisco on Wednesday released patches for over 30 security vulnerabilities in its products, including Critical flaws impacting NX-OS Software. [Read More]
A top US intelligence official warned football fans traveling to Russia for the World Cup that their phones and computers could be hacked by Moscow's cyber spies. [Read More]
Cisco patches critical and high severity vulnerabilities in Prime Collaboration Provisioning (PCP) and other products [Read More]
Fortinet has acquired Boston-based network security firm Bradford Networks to extend Fortinet's micro segmentation. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Ashley Arbuckle's picture
Visibility, segmentation, and threat defense are foundational elements to any security strategy allowing you to reduce risk while creating new opportunities to deliver value to your customers, partners, and the organization.
Lance Cottrell's picture
Net Neutrality holds that the internet should be a passive conduit for data between any endpoints. It should not make any difference to a carrier who is initiating the connection and what service they are using.
Torsten George's picture
Unfortunately, the Cyber Shield Act as it stands falls short, since it is a voluntary program that does not incentivize vendors to implement the NIST security standards.
Marie Hattar's picture
Enterprises need to rethink security to focus less on the perimeter and more on identifying anomalies in user and network behavior that may be indicators of an attack in progress.
Scott Simkin's picture
Blending in with legitimate users, attackers can infiltrate organizations and dwell inside networks for months or even years without being detected.
David Holmes's picture
Several tech vendors have been added to the list of vendors vulnerable to a variation on the Bleichenbacher attack called the ROBOT attack.
Erin O’Malley's picture
Detecting compromises requires monitoring a series of activities over time. Unfortunately, most security tools only have visibility into a certain set of activities and cannot see and comprehend the entire kill chain.
Marc Solomon's picture
There’s no reason that 2018 should be another year where attackers continue to successfully exploit the known.
John Maddison's picture
Cybercriminals have begun to leverage automation and machine learning in their attack tactics, techniques, and procedures (TTP).
Justin Fier's picture
Organizations still using the legacy approaches from a year ago to five years ago are consistently outpaced and forced to play catch-up.