Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Avira launches SafeThings, a new solution designed to help ISPs and manufacturers build security into home routers [Read More]
Researchers have found that the internet suffers an average of 28,700 distinct DoS attacks every day. This is claimed to be 1000 times greater than other reports have indicated. [Read More]
Savitech drivers used by several companies that provide specialized audio products expose PCs to attacks by installing a new root certificate [Read More]
Cisco releases updates for several security, networking and cloud products to address high severity DoS and injection vulnerabilities [Read More]
Cryptonite, a startup that aims to prevent reconnaissance and lateral movement using moving targe defense (MTD) and micro-segmentation technologies, emerges from stealth mode [Read More]
Security analytics firm Skybox raises $150 million to advance its cybersecurity management product [Read More]
Symantec announces new capabilities in Symantec Endpoint Protection (SEP) and claims it’s leapfrogging the competition [Read More]
Study shows one-third of industrial networks are accessible from the Internet and 10% of OT networks are already infected with malware [Read More]
A new, massive Mirai-linked botnet is recruiting improperly secured IoT devices such as IP wireless cameras [Read More]
Security firm discloses several unpatched vulnerabilities affecting Linksys E-series wireless routers [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

John Maddison's picture
Here are six things every organization needs to consider when approaching security, especially during the chaos and time pressures of a network undergoing digital transformation.
David Holmes's picture
DUHK and ROCA are both implementation-specific vulnerabilities concerning one of my favorite topics, random number generators.
Ashley Arbuckle's picture
If you’re among the majority taking an architectural approach to consolidate security vendors then remember, your best defense is a good offense.
Jennifer Blatnik's picture
You can slow down a hacker, but it will do you good to accept that you may never be able to truly stop someone from getting through your first line of defense.
Oliver Rochford's picture
To succeed in an era of rapidly evolving threats and emerging technology and the resulting shortfall of actionable evidence and lack of certainty, hypothesizing is the closest we can get to prediction.
Siggi Stefnisson's picture
SSL encryption can create blind spots in many organizations, as malware in the HTTPS channel is essentially hidden from most web security tools.
Alan Cohen's picture
There are different types of segmentation architectures: network centric, hypervisor centers, or distributed. Let’s take a look at each one and review the puts and takes of each approach.
Jennifer Blatnik's picture
Protecting this data is a necessity as more and more consumers are voluntarily offering up their rights to security or privacy in search for convenience.
Ashley Arbuckle's picture
Segmentation is an important element of any security strategy to mitigate risk from IoT-based attacks, but it has to be done right.
Erin O’Malley's picture
Can you see into all data across your network? Or does some data remain hidden due to silos between network and security operations teams?