Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Microsoft unveils two new cloud-based security technologies: Microsoft Azure Sentinel and Microsoft Threat Experts. [Read More]
Cisco this week released patches for more than a dozen vulnerabilities across its product portfolio, including high severity flaws in HyperFlex, Prime Infrastructure, and Prime Collaboration Assurance. [Read More]
Kaspersky Lab has released Kaspersky CyberTrace, a free threat intelligence fusion and analysis tool to make it easier for security teams to access threat intelligence. [Read More]
Palo Alto Networks has agreed to acquire Security Orchestration, Automation and Response (SOAR) firm Demisto, in a deal valued at $560 million. [Read More]
Micro Focus is expanding its cybersecurity portfolio with the acquisition of cyber-threat protection company Interset. [Read More]
Offensive Security announces the release of Kali Linux 2019.1, which patches bugs and updates Metasploit to version 5.0. [Read More]
The UK's National Cyber Security Centre (NCSC) sees ways of limiting risks from using Huawei in future 5G networks, according to two unnamed sources. [Read More]
Cybersecurity asset management company Axonius this week announced that it has raised $13 million in a Series A funding round led by Bessemer Venture Partners. [Read More]
The latest version of Chrome OS puts the Shill network manager in a sandbox and removes its root privileges. [Read More]
An industrial gateway made by Germany-based Kunbus is affected by serious vulnerabilities that can be exploited to gain complete control of a device. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Marie Hattar's picture
Stopping DDoS attacks is not a matter of improving security of IoT devices. Enterprises need to take responsibility and be better at identifying and preventing DDoS attacks as they happen in real time.
David Holmes's picture
Forward Secrecy (sometimes called Perfect Forward Secrecy or PFS), is a cryptographic technique that adds an additional layer of confidentiality to an encrypted session, ensuring that only the two endpoints can decrypt the traffic.
Laurence Pitt's picture
The rapid proliferation of connected things is leaving networks exposed with more potential entry points that are vulnerable to attack.
Erin O’Malley's picture
SecOps and NetOps are starting to put aside their differences and find ways to work better together. As Gartner reports, these once distinct groups have begun to realize and accept that alignment is not a nice to have, but a business imperative.
John Maddison's picture
Even though a NOC or a SOC consolidates a variety of tools and measurements into a single management system, they are still too isolated.
Joshua Goldfarb's picture
The security operations workflow has grown more sophisticated and complex, and the value that most organizations get out of their SIEM deployment is far lower than it used to be.
Ashley Arbuckle's picture
Visibility, segmentation, and threat defense are foundational elements to any security strategy allowing you to reduce risk while creating new opportunities to deliver value to your customers, partners, and the organization.
Lance Cottrell's picture
Net Neutrality holds that the internet should be a passive conduit for data between any endpoints. It should not make any difference to a carrier who is initiating the connection and what service they are using.
Marie Hattar's picture
Enterprises need to rethink security to focus less on the perimeter and more on identifying anomalies in user and network behavior that may be indicators of an attack in progress.
Scott Simkin's picture
Blending in with legitimate users, attackers can infiltrate organizations and dwell inside networks for months or even years without being detected.