Security Experts:

long dotted


Hackers could exfiltrate data from an air-gapped device over an acoustic channel even if the targeted machine does not have any speakers, by abusing the power supply. [Read More]
A memorandum sent by CISA to CIOs at federal agencies reminds them to use EINSTEIN 3 Accelerated’s DNS sinkholing capability for DNS resolution. [Read More]
Guardicore's open source breach and attack simulation platform Infection Monkey now maps its attack results to the MITRE ATT&CK framework, allowing users to quickly discover internal vulnerabilities and rapidly fix them. [Read More]
New rules require critical information infrastructure operators in China to conduct cybersecurity reviews when purchasing tech products and services. [Read More]
New free service from GreyNoise Intelligence alerts organizations if scan or attack traffic is originating from their networks. [Read More]
Randori, a firm that provides an automated red team attack platform, has raised $20 Million in a Series A funding round led by Harmony Partners. [Read More]
Awake Security, a California-based company that specializes in network traffic analysis, has raised $36 million in a Series C funding round. [Read More]
The GAO has analyzed the Pentagon’s cyber hygiene initiatives and found that they are incomplete and in some cases no one is keeping track of their progress. [Read More]
Cato Networks, early provider of the emerging technology known as secure access service edge (SASE), has raised $77 million in a Series D funding round. [Read More]
The United States threatened Thursday to cut off Beijing-controlled China Telecom from serving the US market because of legal and security risks. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Laurence Pitt's picture
Every business is likely to be subject to cyberattacks at some point, and the option is to either take on the cost of putting measures in place before it happens or paying to clean up after.
John Maddison's picture
The rate at which recent networking changes have had to occur, and the speed at which cybercriminals have been able to respond, teach us clearly what is needed going forward to ensure ongoing proactive cyber protection.
Laurence Pitt's picture
For an MSP looking to grow business, the convergence of SD-WAN and security, along with the transitional needs of customers, translates to opportunity.
John Maddison's picture
Network connections that can change instantaneously in response to shifting business requirements can take a security solution minutes or hours to be reconfigured. And that lag time is prime for exploitation.
Laurence Pitt's picture
Working remotely should be a positive experience. Here are a few simple suggestions that may help during this time of change.
Craig Harber's picture
Many organizations are not aware that their network sensors are improperly or inefficiently deployed because they do not have a full understanding of how to act on the network traffic being collected.
John Maddison's picture
Physical and virtual security appliances traditionally suffer from performance challenges, especially when it comes to critical functions such as inspecting encrypted traffic.
John Maddison's picture
Outpacing your security capacity with digital innovation is a formula for disaster that may take you out of the running in today’s highly competitive digital marketplace entirely.
Craig Harber's picture
Deep visibility allows organizations to see how different pieces of the overall cyber terrain are communicating with one another, enabling them to highlight potential or existing attack vectors.
Justin Fier's picture
Use of artificial intelligence (AI) will change the role of security teams, and improve companies’ ability to defend their data and networks from future compromises, breaches, and sabotage.