Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Tel Aviv-based cyber-attack prevention firm Solebit Labs, currently establishing new global headquarters in Silicon Valley, has announced completion of an $11 million Series A funding round led by ClearSky Security. [Read More]
Mozilla this week detailed its plans to completely distrust Symantec root certificates in Firefox 63, set to arrive in October 2018. [Read More]
Cisco today announced the availability of identification of software vulnerabilities and exposures as part of the security capabilities of its Tetration platform. [Read More]
GitHub was hit by the largest DDoS attack ever disclosed, peaking at 1.3Tbps, more than twice the size of the Mirai attack of 2016. [Read More]
Philips working on patches for dozens of flaws affecting IntelliSpace Portal, a visualization and analysis solution designed for healthcare organizations [Read More]
Fortinet announced a new machine learning (ML) threat intelligence and detection offering, along with a major upgrade to the Fortinet Security Fabric (FortiOS). [Read More]
Splunk has agreed to acquire Phantom Cyber, a provider of Security Orchestration, Automation and Response (SOAR) solutions in a $350 million deal [Read More]
Cisco patches critical vulnerabilities in Unified Communications and Elastic Services Controller products [Read More]
Palo Alto Networks updates PAN-OS operating system and releases a new firewall designed for use in industrial and other harsh environments [Read More]
Several BGP daemon vulnerabilities patched in Quagga, a routing software used by several Unix platforms [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Erin O’Malley's picture
Can you see into all data across your network? Or does some data remain hidden due to silos between network and security operations teams?
David Holmes's picture
Security researchers found 26 vulnerabilities within ISP network devices that would have given them remote admin access to the majority of home networks in the United States.
Oliver Rochford's picture
Security automation is highly desirable. But this desire has been inhibited by doubt about the accuracy of the detection of threats, and fear of the consequences of automating the containment or mitigation responses.
Jennifer Blatnik's picture
Whether they come from a technical, business or even military background, all CISOs experience a number of personal and professional roadblocks on a daily basis that challenge the ultimate success of their company’s security.
Justin Fier's picture
Every company and organizations is vulnerable to cyber-attacks, and investing in security innovations and gaining total network visibility are more important than ever.
Erin O’Malley's picture
Finding patterns and uncovering clues within network noise requires both broad and granular visibility into traffic (plain-text and encrypted) and is essential for defense against advanced threats.
Alan Cohen's picture
Since VMware introduced the concept of micro-segmentation for data center security, the security and networking industry have been racing to introduce competing technologies to reduce the lateral spread of bad actors in the data center and cloud.
Eddie Garcia's picture
Apache Spot is in its early stages yet it already has all the potential to be the platform where the good guys collaborate, sharing models and algorithms to find the bad actors.
Ken McAlpine's picture
Once you’ve decided that you need to include some SD-WAN capabilities to your network, you should also look at the implications to your security practices.
Ashley Arbuckle's picture
When it comes to automation, most defenders are operating at a deficit. So what’s holding so many enterprises back from incorporating automation in their security programs?