Security Experts:

long dotted


Multiple serious security vulnerabilities were addressed in GPU drivers and vGPU software. [Read More]
Ongoing coverage of the SolarWinds Orion attacks and useful resources, including analysis and indicators of compromise (IOC). Check back often for updates. [Read More]
Red Hat buys an innovative container security startup and announced plans to open-source the technology at a later date. [Read More]
Citrix has released firmware updates for its ADC and Gateway appliances after threat actors started abusing them to launch DDoS attacks. [Read More]
Researchers are observing attacks exploiting hardcoded credentials in Zyxel devices. [Read More]
Zyxel releases firmware updates to remove hardcoded credentials from several firewall and WLAN controller products. [Read More]
Before this week, few people were aware of SolarWinds, but the revelation that it has been targeted by elite cyber spies has put many of its customers on high alert, and it’s raising questions about why its biggest investors sold off stock. [Read More]
Microsoft provides information on steps it plans to take towards improving routing security. [Read More]
Apache releases security patch to address remote code execution vulnerability in Struts 2. [Read More]
D-Link is working on releasing firmware updates to address two command injection vulnerabilities that affect multiple VPN router models. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Laurence Pitt's picture
In the world of information security, it’s hard to flip between internet browser tabs without hearing a new term, and one of the biggest in 2020 was Secure Access Service Edge (SASE).
John Maddison's picture
Multi-vendor environments with disparate security solutions that don’t integrate when deployed make it impossible for organizations to securely use the flexible network environments they need to compete effectively.
Tim Bandos's picture
Keeping a ‘six foot distance’ between our digital home life and digital work life can go a long way when it comes to safeguarding our most sensitive data, too.
AJ Nash's picture
Knowing that threat intelligence is readily available and proving its worth is one thing, understanding how to use it within your security operations program is quite another.
Laurence Pitt's picture
To reap the benefits of 5G and ensure security, organizations must be smarter, fully educated and willing to work alongside the tech.
John Maddison's picture
SD-WAN connections are designed to constantly shift and adjust, replacing one connection that has become unstable with another without interrupting application performance.
Gunter Ollmann's picture
The phrase “assume breach” has been transformational to enterprise security investment and defensive strategy for a few years but may now be close to retirement.
Laurence Pitt's picture
To minimize the effect of an attack, an automated response is vital, which can reduce the amount of time between infection and resolution.
John Maddison's picture
By combining verifiable trust, intent-based segmentation, and integrated security, organizations can establish a trustworthy, security-driven networking strategy.
John Maddison's picture
Smart businesses are learning that SD-WAN can play a critical role in quickly—and securely—rolling out new networking environments, and connecting resources and users to data and applications.