Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Cisco adds end-to-end encryption, mobile device security for non-managed devices, and other capabilities to Spark collaboration platform [Read More]
A new DDoS attack method dubbed “pulse wave” is particularly effective against “appliance first, cloud second” hybrid defenses [Read More]
Respond Software emerges from stealth with product that automates the decision-making of a SOC analyst and $12 million in funding [Read More]
Webroot buys security awareness training company Securecast to offer a security awareness platform to MSPs [Read More]
Russia-linked cyberspy group APT28 targets hotels in Europe and their main target may be government and business travelers [Read More]
Under the principle of set a thief to catch a thief, 250 hackers at Black Hat 2017 were asked about their hacking methods and practices. This is what they said... [Read More]
Fuzzing tests conducted by Synopsys customers show industrial protocols are the least mature and the most risky [Read More]
Vulnerabilities found by a researcher in solar panels may allow hackers to disrupt power grids, but the affected vendor says his claims are greatly exaggerated [Read More]
Enterprising internet users in China fear the tools they use to tunnel through the country's "Great Firewall" may soon disappear, as Beijing tightens its grip on the web. [Read More]
Schneider Electric and industrial cybersecurity startup Claroty have teamed up to offer solutions for securing industrial infrastructure [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Eddie Garcia's picture
Apache Spot is in its early stages yet it already has all the potential to be the platform where the good guys collaborate, sharing models and algorithms to find the bad actors.
Ken McAlpine's picture
Once you’ve decided that you need to include some SD-WAN capabilities to your network, you should also look at the implications to your security practices.
Ashley Arbuckle's picture
When it comes to automation, most defenders are operating at a deficit. So what’s holding so many enterprises back from incorporating automation in their security programs?
Preston Hogue's picture
Defenders need a new type of counterinsurgent security that can move out into the jungle to protect users and sensitive data against attackers who disguise their exploits with the very encryption that we think keeps us safe.
Marie Hattar's picture
Understanding how well (or not) websites and networks deal with the unexpected spikes in inbound traffic is the first step in dealing with DDoS attacks.
Avi Chesla's picture
At the end of the day, CISOs are finding it very challenging to be able to assess the performance of the security products in their organization’s arsenal.
Jennifer Blatnik's picture
While automation delivers many benefits to the enterprise, there are dangers to mindlessly automating every business function, especially when it comes to security.
Marie Hattar's picture
Full visibility is necessary when it comes to security, but some things should stay hidden. How do we see the whole network? What tools do we need? How do we stay compliant?
David Holmes's picture
Classic SSL interceptors are notoriously lackadaisical about certificate verification, but that doesn’t mean the only choice is not to use them or that they’re not needed.
Joshua Goldfarb's picture
Although attackers still use malicious code quite often, they have been relying less and less on it. So how do attackers manage to be so successful without using any malware at all?