Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Automation can eliminate misconfigurations, increase security agility while maximizing efficiency and reducing operational costs, and prevent compliance violations. [Read More]
Cisco patches multiple vulnerabilities across products such as Small Business Routers, TelePresence Collaboration Endpoint, RoomOS, and others. [Read More]
A new report from Booz Allen captures what the defense contractor is seeing across a complex cyber landscape, and identifies the necessary actions to remain resilient to continuously evolving threats and leverage security as a business enabler. [Read More]
A controversial law that would allow Russia to cut internet traffic from international servers came into force Friday, prompting fears from rights activists of online isolation. [Read More]
A chain of vulnerabilities in MikroTik routers could allow an attacker to enable a backdoor on a vulnerable system. [Read More]
Fortinet acquires endpoint security company enSilo in an effort to enhance and strengthen its solutions. [Read More]
Cloud networking and security services provider Aviatrix raises $40 million in a Series C funding round, which brings the total raised by the company to over $76 million. [Read More]
Network security firm Palo Alto Networks is planning to increase the price of its hardware products by a 5%, citing impact from recent tariffs for imported components. [Read More]
A group of security researchers from German universities has devised a new class of web cache poisoning attacks that could render victim services unreachable. [Read More]
AWS customers experience service interruptions caused by a DDoS attack aimed at DNS servers. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Laurence Pitt's picture
DDoS attacks are moving away from simply sending out broadcast traffic for massive disruption toward more complex and targeted attacks hitting the application layer of the network that can take down specific applications or services.
Craig Harber's picture
Cybersecurity teams need actionable insight into the latest techniques, tactics and procedures being used by attackers and a continuous understanding of their environment and anomalous behavior.
Laurence Pitt's picture
The best way to stay ahead of threats while enabling business agility to keep up with the latest technology advances is to look to the network as the first line of defense.
Justin Fier's picture
The arrival of 5G will fuel an explosion of never-before-seen IoT machines, introducing uncharted vulnerabilities and opening the door for cyber-criminals to compromise our increasingly intertwined cities.
Craig Harber's picture
Because attackers will exploit the paths of least resistance and move laterally through the enterprise, visibility must include all managed and unmanaged assets (enterprise IoT, shadow IoT, legacy systems, etc.)
John Maddison's picture
Security-Driven Networking is a new, strategic approach to security that enables the seamless expansion of network environments and services without ever compromising on security.
Laurence Pitt's picture
Adoption of 5G not only exposes potential new attack surfaces, but given execution happens at super-speed, it also changes the required nature of any defense.
John Maddison's picture
Many cybersecurity companies claim to have introduced AI capabilities into their solutions, but most fall short of true AI because their underlying infrastructure is too small or their learning models are incomplete.
Ashley Arbuckle's picture
While we can’t turn our attention away from gathering data, we must devise new ways to deal with the onslaught of data. Humans simply can’t keep up, and the problem is getting worse.
Ashley Arbuckle's picture
Breach and Attack Simulation (BAS) tools aid in maintaining a fundamental level of security assurance more quickly and cost effectively than traditional approaches.