Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

TrapX Security, a company providing cyber defense solutions that rely on deception technology, raises $18 million in a Series C funding round. [Read More]
Finite State finds many potential backdoors in Huawei equipment, and says the Chinese company’s products are less secure compared to other vendors. [Read More]
Google announced the general availability of its standard DNS over HTTPS (DoH) service, which includes full RFC 8484 support. [Read More]
Cisco has patched critical and high severity authentication bypass, code execution, and file upload/download vulnerabilities in Data Center Network Manager. [Read More]
Vulcan Cyber, an Israel-based startup that specializes in vulnerability remediation solutions, raised $10 million in a Series A funding round. [Read More]
Indegy announces general availability of CIRRUS, an industrial cybersecurity-as-a-service (ICSaaS) offering. [Read More]
Cisco patches critical and high severity vulnerabilities in SD-WAN, DNA Center, TelePresence, StarOS, RV router, Prime Service Catalog, and Meeting Server products. [Read More]
A critical remote code execution vulnerability allows an unauthenticated hacker to take complete control of some TP-Link Wi-Fi extenders. Firmware updates are available. [Read More]
Several serious vulnerabilities have been found by a researcher in WAGO 852 industrial managed switches. [Read More]
Microsegmentation provider Edgewise Networks has secured $11 million in new funding round. To date, the company has raised $18 million. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Laurence Pitt's picture
While security spending is on the increase, it’s up to us as experienced security practitioners to make the most of this spend with a clear ROI that can be reported to the business.
Torsten George's picture
Using Zero Trust Privilege services can extend corporate security policies and best practices to cloud environments, while reducing costs, improving scalability across multi-VPCs, -SaaS, and -directory environments, and minimizing security blind spots through centralized management.
Danelle Au's picture
Deep learning is an ideal technology to address the volume and velocity of the current threat environment, and can be used to detect a variety of different threats, even ones that seemingly look novel.
John Maddison's picture
Enabling the networks of tomorrow requires organizations to radically reimagine the security solutions they have in place today.
Laurence Pitt's picture
Well deployed automation – a combination of orchestration tools, data leveraged for analytics, machine-learning and artificial intelligence – can provide an edge for an enterprise in today’s ever evolving 24/7 threat landscape.
Gunter Ollmann's picture
75 years may separate War World II from cloud SIEM, but we’re on the cusp of being able to apply the hard-earned learnings from Abraham Wald in our latest adversarial conflict – the cyberwar.
Torsten George's picture
Shifting traditional perimeter-based enterprise security strategies to a Zero Trust approach provides more robust prevention, detection, and incident response capabilities to protect continuously expanding attack surfaces.
Ashley Arbuckle's picture
As organizations digitize their business and make these shifts, they need to know what and who they can trust.
John Maddison's picture
While maintaining consistent network visibility and control is table stakes for any security strategy, they are becoming increasingly difficult to maintain.
Ashley Arbuckle's picture
Through market consolidation, organizations can derive exponentially more value from their security tools.