Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Cisco warns customers of high severity remote code execution vulnerabilities affecting its IOS software. No patch available yet [Read More]
Authentication bypass vulnerability related to the TSIG protocol patched in BIND and Knot DNS [Read More]
An analysis of the Alexa top 1 million websites with Mozilla Observatory showed significant improvements in the use of modern security technologies [Read More]
Kaspersky patches several vulnerabilities, including ones that allow code execution, in its Anti-Virus for Linux File Server product [Read More]
Akamai launches new product designed to protect enterprises against malware, phishing and data exfiltration attempts by analyzing DNS requests [Read More]
IT analytics firm Corvil announced the integration of its Security Analytics with the Cisco Tetration Analytics platform to help detect anomalous communications indicative of compromise. [Read More]
WikiLeaks releases details on Brutal Kangaroo, a tool suite used by the CIA to infect air-gapped networks with malware via thumb drives [Read More]
Elastic Beam emerges from stealth mode with AI-powered API security solution [Read More]
Several vulnerabilities found in HPE SiteScope. No patches available, but users can apply workarounds [Read More]
WikiLeaks releases details on CherryBlossom, a tool used by the CIA to hack wireless routers and access points [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Avi Chesla's picture
At the end of the day, CISOs are finding it very challenging to be able to assess the performance of the security products in their organization’s arsenal.
Jennifer Blatnik's picture
While automation delivers many benefits to the enterprise, there are dangers to mindlessly automating every business function, especially when it comes to security.
Marie Hattar's picture
Full visibility is necessary when it comes to security, but some things should stay hidden. How do we see the whole network? What tools do we need? How do we stay compliant?
David Holmes's picture
Classic SSL interceptors are notoriously lackadaisical about certificate verification, but that doesn’t mean the only choice is not to use them or that they’re not needed.
Joshua Goldfarb's picture
Although attackers still use malicious code quite often, they have been relying less and less on it. So how do attackers manage to be so successful without using any malware at all?
Ken McAlpine's picture
To apply an effective intent-based network security strategy to networks, security teams need to rethink how they plan, design, organize, and implement network architecture.
David Holmes's picture
Ladies and Gentlemen! Gamers and Cryptoheads! Have you ever wondered which major gaming console has the best message encryption? Well, I’m going to reveal the clear winner in my own recent personal test.
Ashley Arbuckle's picture
Generally referred to as the “attack chain,” the approach cybercriminals follow to launch and execute attacks is well-documented and includes reconnaissance, weaponization, delivery, and installation.
Jennifer Blatnik's picture
Focusing on securing an endless amount of endpoints is almost impossible to do effectively. You can’t rely on the devices to be secure and you can’t rely on the consumers to secure their devices themselves.
Alan Cohen's picture
While there are clear security benefits gained through network segmentation, the principal goal of creating subnets is to improve performance, avoiding broadcast storms and latency stimulated by our insatiable requirement for bandwidth.