Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Citrix warns that the bugs could result in privileged code in a guest virtual machine to crash the host or render it unresponsive. [Read More]
North Korean government-backed APT group caught using a fake pen-testing company sock puppet Twitter and LinkedIn accounts in an escalation of a hacking campaign targeting security research professionals. [Read More]
Apple ships an urgent security update to fix a major security flaw affecting iPhone, iPad and Apple Watch devices and warned that the vulnerability is being actively exploited in the wild. [Read More]
Solarwinds has shipped a major security update to fix at least four documented security vulnerabilities, including a pair of bugs that be exploited for remote code execution attacks. [Read More]
Feedzai lands $200 million in funding to build out its AI/ML-based fraud prevention tools for financial services firms. The round was led by KKR. [Read More]
With new financial backing from Great Hill Partners, Jumio plans to invest in automating identity verification solutions and adding new services to its platform. [Read More]
Adobe has released an "critical" patch for a potentially dangerous code execution vulnerability in Adobe ColdFusion. [Read More]
Malware hunters at U.K.-based NCC Group are raising the alarm for mass scanning and “multiple exploitation attempts” against unpatched F5 BIG-IP and BIG-IQ installations. [Read More]
More than a dozen cybersecurity-related acquisitions and mergers were announced in the third week of March 2021. [Read More]
China's government called on Washington to drop efforts to expel three state-owned Chinese phone companies, including China Unicom Americas, a unit of China Unicom, from the United States in a new clash over technology and security. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Gunter Ollmann's picture
The phrase “assume breach” has been transformational to enterprise security investment and defensive strategy for a few years but may now be close to retirement.
Laurence Pitt's picture
To minimize the effect of an attack, an automated response is vital, which can reduce the amount of time between infection and resolution.
John Maddison's picture
By combining verifiable trust, intent-based segmentation, and integrated security, organizations can establish a trustworthy, security-driven networking strategy.
John Maddison's picture
Smart businesses are learning that SD-WAN can play a critical role in quickly—and securely—rolling out new networking environments, and connecting resources and users to data and applications.
Laurence Pitt's picture
Every business is likely to be subject to cyberattacks at some point, and the option is to either take on the cost of putting measures in place before it happens or paying to clean up after.
John Maddison's picture
The rate at which recent networking changes have had to occur, and the speed at which cybercriminals have been able to respond, teach us clearly what is needed going forward to ensure ongoing proactive cyber protection.
Laurence Pitt's picture
For an MSP looking to grow business, the convergence of SD-WAN and security, along with the transitional needs of customers, translates to opportunity.
John Maddison's picture
Network connections that can change instantaneously in response to shifting business requirements can take a security solution minutes or hours to be reconfigured. And that lag time is prime for exploitation.
Laurence Pitt's picture
Working remotely should be a positive experience. Here are a few simple suggestions that may help during this time of change.
Craig Harber's picture
Many organizations are not aware that their network sensors are improperly or inefficiently deployed because they do not have a full understanding of how to act on the network traffic being collected.