Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Cisco Talos researchers find 17 vulnerabilities in Moxa industrial routers, including many high severity command injection and DoS flaws [Read More]
Cloudflare launches Spectrum, a new service designed to extend the company’s DDoS and other protections to gaming, remote access, email and other services [Read More]
More than 65,000 routers exposed to the Internet via the Universal Plug and Play (UPnP) protocol are being abused by cybercriminals as part of a large, multi-purpose proxy botnet, Akamai says. [Read More]
OPAQ Networks raises $22.5 million to accelerate growth and support go-to-market initiatives. Total raised to date is $43.5 million [Read More]
Hackers protest election-related cyberattacks by hijacking many Cisco switches in Iran and Russia - but do the attacks involve the recently disclosed CVE-2018-0171 vulnerability? [Read More]
Recorded Future's threat researchers have linked the Mirai variant IoTroop (aka Reaper) botnet with attacks on the Netherlands financial sector in January 2018. [Read More]
Emerging from stealth mode with $10 million in seed funding, Meta Networks offers a secure software-defined virtual private network aimed at redefining the concept of distributed, cloud-employing corporate networks. [Read More]
Cloudflare wants to provide a fast and secure DNS resolution service, but one where no commercial entity can easily monetize the user data, nor government gain access without a court order. [Read More]
Cisco patches tens of critical and high severity flaws in IOS software, including a vulnerability that exposes hundreds of thousands (possibly millions) of devices to remote attacks from the Internet [Read More]
Figures from an analysis of 4.5 million monitored devices across 246 companies show that for every 10,000 devices and workloads, 165 contain active threats. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Ashley Arbuckle's picture
Visibility, segmentation, and threat defense are foundational elements to any security strategy allowing you to reduce risk while creating new opportunities to deliver value to your customers, partners, and the organization.
Lance Cottrell's picture
Net Neutrality holds that the internet should be a passive conduit for data between any endpoints. It should not make any difference to a carrier who is initiating the connection and what service they are using.
Torsten George's picture
Unfortunately, the Cyber Shield Act as it stands falls short, since it is a voluntary program that does not incentivize vendors to implement the NIST security standards.
Marie Hattar's picture
Enterprises need to rethink security to focus less on the perimeter and more on identifying anomalies in user and network behavior that may be indicators of an attack in progress.
Scott Simkin's picture
Blending in with legitimate users, attackers can infiltrate organizations and dwell inside networks for months or even years without being detected.
David Holmes's picture
Several tech vendors have been added to the list of vendors vulnerable to a variation on the Bleichenbacher attack called the ROBOT attack.
Erin O’Malley's picture
Detecting compromises requires monitoring a series of activities over time. Unfortunately, most security tools only have visibility into a certain set of activities and cannot see and comprehend the entire kill chain.
Marc Solomon's picture
There’s no reason that 2018 should be another year where attackers continue to successfully exploit the known.
John Maddison's picture
Cybercriminals have begun to leverage automation and machine learning in their attack tactics, techniques, and procedures (TTP).
Justin Fier's picture
Organizations still using the legacy approaches from a year ago to five years ago are consistently outpaced and forced to play catch-up.