Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Critical infrastructure protection company OPSWAT acquires Network Access Control (NAC) and Software Defined Perimeter (SDP) solutions provider Impulse. [Read More]
Germany-based industrial connectivity solutions provider Weidmueller has released firmware updates for many of its managed industrial Ethernet switches to address critical vulnerabilities. [Read More]
Cloudflare this week announced the open source availability of Flan Scan, its lightweight network vulnerability scanner. [Read More]
ZecOps, a San Francisco-based threat detection and security automation company, has secured a total of $10.2 million through a seed funding round. [Read More]
Israeli cybersecurity firm Pcysys has completed a $10 million Series A funding round, which brings the total raised by the company to $15 million. [Read More]
Automation can eliminate misconfigurations, increase security agility while maximizing efficiency and reducing operational costs, and prevent compliance violations. [Read More]
Cisco patches multiple vulnerabilities across products such as Small Business Routers, TelePresence Collaboration Endpoint, RoomOS, and others. [Read More]
A new report from Booz Allen captures what the defense contractor is seeing across a complex cyber landscape, and identifies the necessary actions to remain resilient to continuously evolving threats and leverage security as a business enabler. [Read More]
A controversial law that would allow Russia to cut internet traffic from international servers came into force Friday, prompting fears from rights activists of online isolation. [Read More]
A chain of vulnerabilities in MikroTik routers could allow an attacker to enable a backdoor on a vulnerable system. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Danelle Au's picture
Deep learning is an ideal technology to address the volume and velocity of the current threat environment, and can be used to detect a variety of different threats, even ones that seemingly look novel.
John Maddison's picture
Enabling the networks of tomorrow requires organizations to radically reimagine the security solutions they have in place today.
Laurence Pitt's picture
Well deployed automation – a combination of orchestration tools, data leveraged for analytics, machine-learning and artificial intelligence – can provide an edge for an enterprise in today’s ever evolving 24/7 threat landscape.
Gunter Ollmann's picture
75 years may separate War World II from cloud SIEM, but we’re on the cusp of being able to apply the hard-earned learnings from Abraham Wald in our latest adversarial conflict – the cyberwar.
Torsten George's picture
Shifting traditional perimeter-based enterprise security strategies to a Zero Trust approach provides more robust prevention, detection, and incident response capabilities to protect continuously expanding attack surfaces.
Ashley Arbuckle's picture
As organizations digitize their business and make these shifts, they need to know what and who they can trust.
John Maddison's picture
While maintaining consistent network visibility and control is table stakes for any security strategy, they are becoming increasingly difficult to maintain.
Ashley Arbuckle's picture
Through market consolidation, organizations can derive exponentially more value from their security tools.
Ashley Arbuckle's picture
Network Segmentation can prevent lateral movement and effectively improve security, and is a continuous journey that every organization should take.
John Maddison's picture
Security frameworks need to see and adapt to network changes, share and correlate threat intelligence, and respond to threats as a unified system.