Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A vulnerability in the NetUSB kernel module could allow remote attackers to execute code on millions of vulnerable devices. [Read More]
The non-profit group says companies that ship open-source code should do much more to help with security audits and fixes. [Read More]
The U.K.’s National Health Service warns that an unknown threat actor is successfully hitting vulnerable VMWare Horizon servers with Log4j exploits. [Read More]
Researchers document a credential -stealing banking malware campaign exploiting Microsoft's digital signature verification. [Read More]
VMware ships patches for heap-overflow vulnerability that could lead to code execution attacks. [Read More]
Recorded Future snaps up SecurityTrails for a direct entry into the booming attack surface management business. [Read More]
The Goldman Sachs-owned startup formerly known as White Ops is planning on global expansion and new industry categories. [Read More]
Google expands push into the lucrative cybersecurity business with a new deal to acquire late-state SOAR startup Siemplify. [Read More]
Hospitality chain McMenamins confirms employee information dating back to January 1998 was compromised in a recent ransomware attack. [Read More]
CrowdStrike is using Intel CPU telemetry to beef up detection of sophisticated exploits and to backport memory safety protections to oder PCs. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Gordon Lawson's picture
The rise of social engineering tactics as well as risks associated with embedded vulnerabilities in contractor networks makes keeping this technology confidential and out of the hands of adversaries increasingly difficult.
Derek Manky's picture
While the sky just may be the limit (or actually, it may not be), when it comes to cybercriminals, three key areas where we expect to see more activity in the coming year are space, digital wallets and esports.
John Maddison's picture
Security must be as agile as today's workforce, ensuring consistent protection and optimal user experience regardless of where a user or device operates.
Marie Hattar's picture
In order to deliver on the promise of 5G, we need new industry standards for security, testing, and training to proactively combat 5G cyber threats and minimize risks.
Gordon Lawson's picture
For red teams, using an obfuscated network for testing offers the advantage of hiding who is performing the attack and where it is originating, for a more real-life context
John Maddison's picture
Recent changes have resulted in a proliferation of devices and users working from anywhere, which has expanded the digital attack surface and exposed more applications, devices, data, and users to risk.
John Maddison's picture
Zero-trust network access (ZTNA) simplifies secure connectivity by providing seamless, per-use access to applications, no matter where the user or application may be located.
Torsten George's picture
While there is no silver bullet to prevent cybersecurity attacks, ZTNA has become a necessity for organizations on their digital transformation journey by allowing to minimize the attack surface while ensuring the productivity of remote workers.
John Maddison's picture
Organizations considering ZTNA should look for these three essential components as a minimum when evaluating any solution.
Torsten George's picture
As it has become clear that remote/hybrid work is here to stay, IT security practitioners must figure out how to enable a secure and resilient anywhere workforce to minimize their future risk exposure.