Security Experts:

long dotted


European Digital Rights (EDRi), together with 45 NGOs, academics and companies across 15 countries, has sent an open letter to European policymakers and regulators, warning about widespread and potentially growing use of deep packet inspection (DPI) by ISPS. [Read More]
Sumo Logic, a SaaS machine data analytics platform provider, has secured $110 million through a funding round led by Battery Ventures. [Read More]
Exabeam, a San Mateo, California-based provider of a security information and event management (SIEM) solutions, announced on Tuesday that it has closed $75 million in Series E funding. [Read More]
Proofpoint has agreed to acquire zero trust network access (ZTNA) provider Meta Networks in a transaction valued at roughly $120 million. [Read More]
Cisco has released patches for tens of vulnerabilities in its products, including a Critical flaw impacting Nexus 9000 switches. [Read More]
Citrix said hackers had access to its network for five months and they may have stolen names, SSNs and financial information relating to current and former employees. [Read More]
Cisco Talos researchers find nearly a dozen vulnerabilities in Sierra Wireless AirLink gateways and routers, including serious flaws that can be exploited to change system settings, execute arbitrary code, and modify passwords. [Read More]
Researchers believe that at least 40 different organizations across 13 countries have been compromised by elite state-sponsored hackers using DNS hijacking campaigns. [Read More]
Cisco releases patches for 30 vulnerabilities, including a critical bug impacting ASR 9000 Series Aggregation Services Routers running IOS XR 64-bit software. [Read More]
Fortinet agreed a deal worth $545,000 to settle a whistleblower lawsuit that alleged that Fortinet had supplied mislabeled goods manufactured by countries including China, falsely representing the goods were in compliance with the U.S Trade Agreements Act (TAA). [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Stan Engelbrecht's picture
These seven processes should be automated in order to save valuable time during incident response and security investigation procedures, and help organizations improve their overall cybersecurity posture.
John Maddison's picture
To ensure that your existing IPS solution doesn’t become a weak link in your security strategy, you should be constantly tracking and evaluating its effectiveness—especially older, legacy solutions.
Torsten George's picture
By implementing these measures organizations can limit their exposure to remote access-based cyber threats, while supporting agile business models such as remote work and outsourced IT.
Joshua Goldfarb's picture
In security, one of our goals should always be to broaden our perspective, field of view, and horizons to minimize the risk that we will be blindsided by something we didn’t see coming.
Joshua Goldfarb's picture
When an organization controls its security technology portion size, it enables the organization to better address strategic requirements and to work far more efficiently.
Stan Engelbrecht's picture
The principles of automation and orchestration are necessary to counter the skills and resource gap, and their impact is amplified when applied across the broader picture of cybersecurity, compliance, risk and case management.
Marie Hattar's picture
Stopping DDoS attacks is not a matter of improving security of IoT devices. Enterprises need to take responsibility and be better at identifying and preventing DDoS attacks as they happen in real time.
David Holmes's picture
Forward Secrecy (sometimes called Perfect Forward Secrecy or PFS), is a cryptographic technique that adds an additional layer of confidentiality to an encrypted session, ensuring that only the two endpoints can decrypt the traffic.
Laurence Pitt's picture
The rapid proliferation of connected things is leaving networks exposed with more potential entry points that are vulnerable to attack.
Erin O’Malley's picture
SecOps and NetOps are starting to put aside their differences and find ways to work better together. As Gartner reports, these once distinct groups have begun to realize and accept that alignment is not a nice to have, but a business imperative.