Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Network security company Netography, which emerged from stealth in February 2019, launches an open beta of its first service, Distributed IPS. [Read More]
A recently detected attack campaign is attempting to ensnare Elasticsearch clusters into a distributed denial of service (DDoS) botnet, Trend Micro reports. [Read More]
There has been a marked shift towards zero trust authentication principles being used by organizations to solve the new always-on remote access problems. [Read More]
Researchers discovered a serious vulnerability that gave remote attackers access to millions of files stored on thousands of discontinued Lenovo storage devices. [Read More]
Researchers have detected a new DNS hijacking technique they believe to be connected to the "Sea Turtle" threat actors. [Read More]
U.S. Coast Guard recently warned commercial vessel owners and operators of malware and phishing attacks and potential vulnerabilities in shipboard systems. [Read More]
Researchers noticed that the firmware for some Cisco switches contains X.509 certificates and associated private keys issued to a US-based subsidiary of Huawei. [Read More]
TrapX Security, a company providing cyber defense solutions that rely on deception technology, raises $18 million in a Series C funding round. [Read More]
Finite State finds many potential backdoors in Huawei equipment, and says the Chinese company’s products are less secure compared to other vendors. [Read More]
Google announced the general availability of its standard DNS over HTTPS (DoH) service, which includes full RFC 8484 support. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Ashley Arbuckle's picture
While we can’t turn our attention away from gathering data, we must devise new ways to deal with the onslaught of data. Humans simply can’t keep up, and the problem is getting worse.
Ashley Arbuckle's picture
Breach and Attack Simulation (BAS) tools aid in maintaining a fundamental level of security assurance more quickly and cost effectively than traditional approaches.
John Maddison's picture
Analyzing threat trends can provide security professionals with insights into how to better protect their organizations from the latest cyber threats.
Gunter Ollmann's picture
While cloud SIEM may be new for most organizations, its ability to harness the innate capabilities of public cloud are transforming security operations.
Laurence Pitt's picture
While security spending is on the increase, it’s up to us as experienced security practitioners to make the most of this spend with a clear ROI that can be reported to the business.
Torsten George's picture
Using Zero Trust Privilege services can extend corporate security policies and best practices to cloud environments, while reducing costs, improving scalability across multi-VPCs, -SaaS, and -directory environments, and minimizing security blind spots through centralized management.
Danelle Au's picture
Deep learning is an ideal technology to address the volume and velocity of the current threat environment, and can be used to detect a variety of different threats, even ones that seemingly look novel.
John Maddison's picture
Enabling the networks of tomorrow requires organizations to radically reimagine the security solutions they have in place today.
Laurence Pitt's picture
Well deployed automation – a combination of orchestration tools, data leveraged for analytics, machine-learning and artificial intelligence – can provide an edge for an enterprise in today’s ever evolving 24/7 threat landscape.
Gunter Ollmann's picture
75 years may separate War World II from cloud SIEM, but we’re on the cusp of being able to apply the hard-earned learnings from Abraham Wald in our latest adversarial conflict – the cyberwar.