Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

IOActive researchers found 10 vulnerabilities affecting more than 20 models of Linksys Smart Wi-Fi routers [Read More]
Cisco has released software updates to patch high severity DoS vulnerabilities in Firepower, ASA, IOS and UCM products [Read More]
Juniper Networks patches several high and medium severity vulnerabilities with Junos OS updates [Read More]
Mandatory Certificate Authority Authorization (CAA) checks will make the issuance of SSL/TLS (Secure Sockets Layer/Transport Layer Security) certificates a more secure process. [Read More]
Cisco Talos researchers identified over a dozen vulnerabilities in Moxa industrial wireless access points (APs) as part of a two-week analysis of the product [Read More]
Researchers find serious vulnerabilities in Riverbed’s SteelCentral application and network performance monitoring system [Read More]
QNAP patches 20 vulnerabilities in NAS products, including ones that can be exploited to take control of affected devices [Read More]
Cisco patches critical default credentials vulnerability in Aironet access points. Serious flaws also fixed in Wireless LAN Controller [Read More]
A newly discovered variant of the Mirai botnet was responsible for powering a 54-hour distributed denial of service (DDoS) attack, Imperva researchers reveal. [Read More]
Cisco patches critical remote code execution vulnerability found by the company in its industrial routers [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Jennifer Blatnik's picture
Focusing on securing an endless amount of endpoints is almost impossible to do effectively. You can’t rely on the devices to be secure and you can’t rely on the consumers to secure their devices themselves.
Alan Cohen's picture
While there are clear security benefits gained through network segmentation, the principal goal of creating subnets is to improve performance, avoiding broadcast storms and latency stimulated by our insatiable requirement for bandwidth.
Rafal Los's picture
Do you ever find yourself trying to protect your organization from exotic attack scenarios that are highly unlikely or that would have a minimal impact on you?
Lance Cottrell's picture
When properly integrated, detection, response, and prevention reinforce each other, each making the other more effective.
Torsten George's picture
While machine learning can help reduce time-to-remediation, will it ever be able to autonomously protect organizations against cyber-attacks?
Avi Chesla's picture
Our cybersecurity ecosystem needs to be simplified – this is a fundamental challenge that the industry has avoided talking about. This need for simplification is what lies at the core of “Security Abstraction “
Alan Cohen's picture
Organizations of any size can do one important thing to help address this challenge: better segment their interior networks and data center operations.
Marie Hattar's picture
Monitoring and securing modern network flows requires granular insight, only possible through sophisticated and automated analytics and security tools.
Marc Solomon's picture
Intelligence-driven security starts with changing how we collect and manage the millions of points of threat data that analysts are bombarded with every day.
Ashley Arbuckle's picture
By aligning your segmentation strategy to business objectives you can respond quickly to the needs of the business while reducing risk and protecting data and applications.