Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Mozilla announced plans to gradually roll-out DNS-over-HTTPS (DoH) in Firefox starting in September 2019. [Read More]
Cisco this week addressed a High severity vulnerability in the Webex Teams client for Windows that could allow an attacker to execute commands remotely. [Read More]
Cisco has released new guides to help first responders collect forensic evidence from potentially hacked IOS, ASA or FTD devices. [Read More]
Hackers continue to look for Pulse Secure and Fortinet devices affected by recently disclosed flaws, but both companies have taken steps to protect customers. [Read More]
A researcher has disclosed details and created Metasploit modules for Cisco UCS vulnerabilities that can be exploited to take complete control of affected systems. [Read More]
VMware announces significant enhancements, including in security, to its Virtual Cloud Network offering. [Read More]
Cisco announced on Wednesday that it patched 17 critical and high-severity vulnerabilities in some of its Unified Computing products. [Read More]
AWS has reached out to customers reportedly targeted by the Capital One hacker, but says none of them reported any significant issues. [Read More]
The Mutually Agreed Norms for Routing Security (MANRS) project launches Observatory, a free tool designed to help network operators improve routing security. [Read More]
Broadcom agreed to acquire the enterprise unit of cybersecurity firm Symantec Corp. for $10.7 billion in a move to further diversify the US semiconductor maker. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

John Maddison's picture
Many cybersecurity companies claim to have introduced AI capabilities into their solutions, but most fall short of true AI because their underlying infrastructure is too small or their learning models are incomplete.
Ashley Arbuckle's picture
While we can’t turn our attention away from gathering data, we must devise new ways to deal with the onslaught of data. Humans simply can’t keep up, and the problem is getting worse.
Ashley Arbuckle's picture
Breach and Attack Simulation (BAS) tools aid in maintaining a fundamental level of security assurance more quickly and cost effectively than traditional approaches.
John Maddison's picture
Analyzing threat trends can provide security professionals with insights into how to better protect their organizations from the latest cyber threats.
Gunter Ollmann's picture
While cloud SIEM may be new for most organizations, its ability to harness the innate capabilities of public cloud are transforming security operations.
Laurence Pitt's picture
While security spending is on the increase, it’s up to us as experienced security practitioners to make the most of this spend with a clear ROI that can be reported to the business.
Torsten George's picture
Using Zero Trust Privilege services can extend corporate security policies and best practices to cloud environments, while reducing costs, improving scalability across multi-VPCs, -SaaS, and -directory environments, and minimizing security blind spots through centralized management.
Danelle Au's picture
Deep learning is an ideal technology to address the volume and velocity of the current threat environment, and can be used to detect a variety of different threats, even ones that seemingly look novel.
John Maddison's picture
Enabling the networks of tomorrow requires organizations to radically reimagine the security solutions they have in place today.
Laurence Pitt's picture
Well deployed automation – a combination of orchestration tools, data leveraged for analytics, machine-learning and artificial intelligence – can provide an edge for an enterprise in today’s ever evolving 24/7 threat landscape.