Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Distributed denial of service (DDoS) attacks continue to grow in size and sophistication, with network layer attacks reaching record levels in the fourth quarter of 2016, Imperva reports. [Read More]
An unpatched command injection vulnerability affecting many Ubiquiti products allows attackers to hack devices [Read More]
Financially motivated attackers have become just as sophisticated as state-sponsored actors, says FireEye in 2017 M-Trends report [Read More]
Several Cisco products are exposed to attacks due to the Apache Struts 2 vulnerability that has been exploited in the wild [Read More]
1 in 5 websites worldwide still use certificates using the SHA-1 cryptographic hash function, according to analysis by security firm Venafi. [Read More]
The latest update for Aruba’s AirWave network management product patches XXE and XSS vulnerabilities [Read More]
Siemens patches XSS and CSRF vulnerabilities in RUGGEDCOM network management system (NMS) [Read More]
Palo Alto Networks on Tuesday announced that it has acquired breach detection firm LightCyber for $105 million in cash. [Read More]
D-Link patches serious authentication bypass vulnerabilities in its DGS-1510 stackable managed switches [Read More]
Fortinet released details on the top malware, ransomware, mobile malware, IPS events, botnets, and exploit kits targeting the healthcare industry in Q4 2016. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Joshua Goldfarb's picture
Although attackers still use malicious code quite often, they have been relying less and less on it. So how do attackers manage to be so successful without using any malware at all?
Ken McAlpine's picture
To apply an effective intent-based network security strategy to networks, security teams need to rethink how they plan, design, organize, and implement network architecture.
David Holmes's picture
Ladies and Gentlemen! Gamers and Cryptoheads! Have you ever wondered which major gaming console has the best message encryption? Well, I’m going to reveal the clear winner in my own recent personal test.
Ashley Arbuckle's picture
Generally referred to as the “attack chain,” the approach cybercriminals follow to launch and execute attacks is well-documented and includes reconnaissance, weaponization, delivery, and installation.
Jennifer Blatnik's picture
Focusing on securing an endless amount of endpoints is almost impossible to do effectively. You can’t rely on the devices to be secure and you can’t rely on the consumers to secure their devices themselves.
Alan Cohen's picture
While there are clear security benefits gained through network segmentation, the principal goal of creating subnets is to improve performance, avoiding broadcast storms and latency stimulated by our insatiable requirement for bandwidth.
Rafal Los's picture
Do you ever find yourself trying to protect your organization from exotic attack scenarios that are highly unlikely or that would have a minimal impact on you?
Lance Cottrell's picture
When properly integrated, detection, response, and prevention reinforce each other, each making the other more effective.
Torsten George's picture
While machine learning can help reduce time-to-remediation, will it ever be able to autonomously protect organizations against cyber-attacks?
Avi Chesla's picture
Our cybersecurity ecosystem needs to be simplified – this is a fundamental challenge that the industry has avoided talking about. This need for simplification is what lies at the core of “Security Abstraction “