Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Critical infrastructure protection company OPSWAT acquires Network Access Control (NAC) and Software Defined Perimeter (SDP) solutions provider Impulse. [Read More]
Germany-based industrial connectivity solutions provider Weidmueller has released firmware updates for many of its managed industrial Ethernet switches to address critical vulnerabilities. [Read More]
Cloudflare this week announced the open source availability of Flan Scan, its lightweight network vulnerability scanner. [Read More]
ZecOps, a San Francisco-based threat detection and security automation company, has secured a total of $10.2 million through a seed funding round. [Read More]
Israeli cybersecurity firm Pcysys has completed a $10 million Series A funding round, which brings the total raised by the company to $15 million. [Read More]
Automation can eliminate misconfigurations, increase security agility while maximizing efficiency and reducing operational costs, and prevent compliance violations. [Read More]
Cisco patches multiple vulnerabilities across products such as Small Business Routers, TelePresence Collaboration Endpoint, RoomOS, and others. [Read More]
A new report from Booz Allen captures what the defense contractor is seeing across a complex cyber landscape, and identifies the necessary actions to remain resilient to continuously evolving threats and leverage security as a business enabler. [Read More]
A controversial law that would allow Russia to cut internet traffic from international servers came into force Friday, prompting fears from rights activists of online isolation. [Read More]
A chain of vulnerabilities in MikroTik routers could allow an attacker to enable a backdoor on a vulnerable system. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

John Maddison's picture
Outpacing your security capacity with digital innovation is a formula for disaster that may take you out of the running in today’s highly competitive digital marketplace entirely.
Craig Harber's picture
Deep visibility allows organizations to see how different pieces of the overall cyber terrain are communicating with one another, enabling them to highlight potential or existing attack vectors.
Justin Fier's picture
Use of artificial intelligence (AI) will change the role of security teams, and improve companies’ ability to defend their data and networks from future compromises, breaches, and sabotage.
Craig Harber's picture
By using decoys to capture adversary tools, understand their techniques, and detect their actions during early attack phases, security teams can detect problems sooner and avoid long dwell times.
Laurence Pitt's picture
DDoS attacks are moving away from simply sending out broadcast traffic for massive disruption toward more complex and targeted attacks hitting the application layer of the network that can take down specific applications or services.
Craig Harber's picture
Cybersecurity teams need actionable insight into the latest techniques, tactics and procedures being used by attackers and a continuous understanding of their environment and anomalous behavior.
Laurence Pitt's picture
The best way to stay ahead of threats while enabling business agility to keep up with the latest technology advances is to look to the network as the first line of defense.
Justin Fier's picture
The arrival of 5G will fuel an explosion of never-before-seen IoT machines, introducing uncharted vulnerabilities and opening the door for cyber-criminals to compromise our increasingly intertwined cities.
Craig Harber's picture
Because attackers will exploit the paths of least resistance and move laterally through the enterprise, visibility must include all managed and unmanaged assets (enterprise IoT, shadow IoT, legacy systems, etc.)
John Maddison's picture
Security-Driven Networking is a new, strategic approach to security that enables the seamless expansion of network environments and services without ever compromising on security.