Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Google has decided that starting with Chrome 63 resources delivered over FTP will be labeled “not secure” [Read More]
US Energy Department announces $50 million investment in tools and technology to improve resilience and security of energy infrastructure. Over $20 million allocated for cybersecurity [Read More]
A researcher has disclosed the details of several serious unpatched vulnerabilities affecting D-Link DIR-850L routers [Read More]
Smiths Medical Medfusion 4000 wireless syringe infusion pumps affected by serious flaws. Patches coming only next year [Read More]
A variant of the WireX Android botnet is able to deliver high-volume UDP Flood DDoS attacks, with a single bot capable of generating over 250GB of attack traffic per attack directive. [Read More]
Westermo patches high severity vulnerabilities found by Qualys in the company’s MRD industrial wireless routers [Read More]
Five vulnerabilities have been found in Arris-manufactured home networking equipment supplied in AT&T's U-verse service. [Read More]
Vulnerabilities in PoS systems from SAP and other vendors allow hackers to steal payment card data and change prices [Read More]
Vulnerabilities in Cisco’s IOS software expose industrial switches from Rockwell Automation to remote attacks [Read More]
Google introduces the beta version of the App Engine firewall, a new security feature for its cloud platform [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Siggi Stefnisson's picture
SSL encryption can create blind spots in many organizations, as malware in the HTTPS channel is essentially hidden from most web security tools.
Alan Cohen's picture
There are different types of segmentation architectures: network centric, hypervisor centers, or distributed. Let’s take a look at each one and review the puts and takes of each approach.
Jennifer Blatnik's picture
Protecting this data is a necessity as more and more consumers are voluntarily offering up their rights to security or privacy in search for convenience.
Ashley Arbuckle's picture
Segmentation is an important element of any security strategy to mitigate risk from IoT-based attacks, but it has to be done right.
Erin O’Malley's picture
Can you see into all data across your network? Or does some data remain hidden due to silos between network and security operations teams?
David Holmes's picture
Security researchers found 26 vulnerabilities within ISP network devices that would have given them remote admin access to the majority of home networks in the United States.
Oliver Rochford's picture
Security automation is highly desirable. But this desire has been inhibited by doubt about the accuracy of the detection of threats, and fear of the consequences of automating the containment or mitigation responses.
Jennifer Blatnik's picture
Whether they come from a technical, business or even military background, all CISOs experience a number of personal and professional roadblocks on a daily basis that challenge the ultimate success of their company’s security.
Justin Fier's picture
Every company and organizations is vulnerable to cyber-attacks, and investing in security innovations and gaining total network visibility are more important than ever.
Erin O’Malley's picture
Finding patterns and uncovering clues within network noise requires both broad and granular visibility into traffic (plain-text and encrypted) and is essential for defense against advanced threats.