Security Experts:

long dotted


The latest version of Chrome OS puts the Shill network manager in a sandbox and removes its root privileges. [Read More]
An industrial gateway made by Germany-based Kunbus is affected by serious vulnerabilities that can be exploited to gain complete control of a device. [Read More]
Fortinet this week announced new FortiGate Next-Generation Firewalls (NGFWs), designed to help customers improve security through implementing Intent-based Segmentation. [Read More]
Netography, a network security solutions provider founded by DDoS mitigation and network security experts, emerges from stealth with $2.6 million in seed funding. [Read More]
Researchers discover over two dozen RDP vulnerabilities, including ones that allow a malicious RDP server to hack a device running the client RDP software. [Read More]
Canon’s third generation of imageRUNNER ADVANCE printers introduces SIEM integration and other cybersecurity features that should help enterprises protect their systems against threats. [Read More]
A vulnerability uncovered recently in Ubiquiti devices has been targeted in DoS attacks. Nearly 500,000 devices could be exposed. [Read More]
Attackers recently started abusing the Constrained Application Protocol (CoAP) for the reflection/amplification of distributed denial of service (DDoS) attacks, NETSCOUT warns. [Read More]
Starting on February 1, 2019, a number of DNS software and service providers will cease implementing DNS resolver workarounds for systems that don’t follow the Extensions to DNS (EDNS) protocol. [Read More]
Salt Security emerges from stealth mode with a solution designed to identify and prevent API attacks and $10 million in funding. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Ashley Arbuckle's picture
Network Segmentation can prevent lateral movement and effectively improve security, and is a continuous journey that every organization should take.
John Maddison's picture
Security frameworks need to see and adapt to network changes, share and correlate threat intelligence, and respond to threats as a unified system.
Devon Kerr's picture
To take advantage of the MITRE ATT&CK matrix, you must accept and prioritize the importance of visibility within your security operation.
Ashley Arbuckle's picture
Network segmentation can be challenging to implement, scale, and manage. But, you shouldn’t let this reality prevent you from moving forward.
John Maddison's picture
In an SD-WAN environment, security needs to not only protect data and resources, but also ensure that performance and controlling costs are preserved.
Torsten George's picture
While implementing Zero Trust is a journey that cannot be achieved over night, it also doesn’t require a complete redesign of existing network architectures.
Marie Hattar's picture
In the ever more complicated world of modern IT networks, visibility is the increasingly pressing challenge that security teams need to solve to stop cyber attacks.
Marc Solomon's picture
Adversaries are increasingly masterful at taking advantage of these seams between technologies and teams to infiltrate organizations and remain below the radar.
Marie Hattar's picture
A big part of making autonomous driving accessible will be the ability for car makers and suppliers to secure the networks that power these increasingly sophisticated vehicles.
John Maddison's picture
Given the growth of sophisticated and pervasive threats and malware, extra caution must be taken to compensate for the security protections inherent in traditional MPLS connections.