Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

D-Link patches serious authentication bypass vulnerabilities in its DGS-1510 stackable managed switches [Read More]
Fortinet released details on the top malware, ransomware, mobile malware, IPS events, botnets, and exploit kits targeting the healthcare industry in Q4 2016. [Read More]
Cisco launches four new Firepower next-generation firewalls for businesses that perform a high volume of sensitive transactions [Read More]
Unpatched vulnerabilities in Java and Python allow attackers to use FTP injections to bypass firewalls, including from Cisco and Palo Alto Networks [Read More]
IT analytics firm ExtraHop Networks today announced ExtraHop Addy, a cloud-based machine-learning wire data analytical tool that is being trained to automatically detect anomalies on the fly as they are happening. [Read More]
Israeli startup Empow Cyber Security announced on Thursday that it has raised $9 million in a Series A funding round. [Read More]
F5 Networks BIG-IP appliances are affected by a vulnerability dubbed Ticketbleed that allows a remote attacker to extract memory [Read More]
Study by Google, Mozilla and others shows that antiviruses and middleboxes weaken HTTPS security and introduce vulnerabilities [Read More]
Analysis of 128 penetration tests conducted in the fourth quarter of 2016 shows that approximately two-thirds of tested companies were successfully breached. [Read More]
Palo Alto Networks improves Next-Generation Security Platform with more than 70 new features and launches new firewalls [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Avi Chesla's picture
Our cybersecurity ecosystem needs to be simplified – this is a fundamental challenge that the industry has avoided talking about. This need for simplification is what lies at the core of “Security Abstraction “
Alan Cohen's picture
Organizations of any size can do one important thing to help address this challenge: better segment their interior networks and data center operations.
Marie Hattar's picture
Monitoring and securing modern network flows requires granular insight, only possible through sophisticated and automated analytics and security tools.
Marc Solomon's picture
Intelligence-driven security starts with changing how we collect and manage the millions of points of threat data that analysts are bombarded with every day.
Ashley Arbuckle's picture
By aligning your segmentation strategy to business objectives you can respond quickly to the needs of the business while reducing risk and protecting data and applications.
Lance Cottrell's picture
The old castle wall model of perimeter security is almost worthless and often leads to poorly designed architectures and strategies.
Ken McAlpine's picture
When looking to solve IoT security challenges, look for products that support a multi-vendor enforcement fabric to share, synchronize, and automatically respond to threats.
Scott Simkin's picture
In discussions about cybersecurity, a word that gets used a lot is “prevention.” How do you prevent cyberattacks before they succeed?
Erin O’Malley's picture
Visibility—delivered via a centralized platform—is the only thing that is going to bring order to the kluge that is the modern-day network.
David Holmes's picture
Since Dyn is the major DNS provider for Twitter, Github, and Spotify, the knock-on effects of the massive DDoS attack have had a global reach.