Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Cisco patches multiple vulnerabilities across products such as Small Business Routers, TelePresence Collaboration Endpoint, RoomOS, and others. [Read More]
A new report from Booz Allen captures what the defense contractor is seeing across a complex cyber landscape, and identifies the necessary actions to remain resilient to continuously evolving threats and leverage security as a business enabler. [Read More]
A controversial law that would allow Russia to cut internet traffic from international servers came into force Friday, prompting fears from rights activists of online isolation. [Read More]
A chain of vulnerabilities in MikroTik routers could allow an attacker to enable a backdoor on a vulnerable system. [Read More]
Fortinet acquires endpoint security company enSilo in an effort to enhance and strengthen its solutions. [Read More]
Cloud networking and security services provider Aviatrix raises $40 million in a Series C funding round, which brings the total raised by the company to over $76 million. [Read More]
Network security firm Palo Alto Networks is planning to increase the price of its hardware products by a 5%, citing impact from recent tariffs for imported components. [Read More]
A group of security researchers from German universities has devised a new class of web cache poisoning attacks that could render victim services unreachable. [Read More]
AWS customers experience service interruptions caused by a DDoS attack aimed at DNS servers. [Read More]
Outdated and unsupported operating systems are still present and they still pose a serious risk in many industrial organizations. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Craig Harber's picture
Cybersecurity teams need actionable insight into the latest techniques, tactics and procedures being used by attackers and a continuous understanding of their environment and anomalous behavior.
Laurence Pitt's picture
The best way to stay ahead of threats while enabling business agility to keep up with the latest technology advances is to look to the network as the first line of defense.
Justin Fier's picture
The arrival of 5G will fuel an explosion of never-before-seen IoT machines, introducing uncharted vulnerabilities and opening the door for cyber-criminals to compromise our increasingly intertwined cities.
Craig Harber's picture
Because attackers will exploit the paths of least resistance and move laterally through the enterprise, visibility must include all managed and unmanaged assets (enterprise IoT, shadow IoT, legacy systems, etc.)
John Maddison's picture
Security-Driven Networking is a new, strategic approach to security that enables the seamless expansion of network environments and services without ever compromising on security.
Laurence Pitt's picture
Adoption of 5G not only exposes potential new attack surfaces, but given execution happens at super-speed, it also changes the required nature of any defense.
John Maddison's picture
Many cybersecurity companies claim to have introduced AI capabilities into their solutions, but most fall short of true AI because their underlying infrastructure is too small or their learning models are incomplete.
Ashley Arbuckle's picture
While we can’t turn our attention away from gathering data, we must devise new ways to deal with the onslaught of data. Humans simply can’t keep up, and the problem is getting worse.
Ashley Arbuckle's picture
Breach and Attack Simulation (BAS) tools aid in maintaining a fundamental level of security assurance more quickly and cost effectively than traditional approaches.
John Maddison's picture
Analyzing threat trends can provide security professionals with insights into how to better protect their organizations from the latest cyber threats.