Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Proofpoint has agreed to acquire zero trust network access (ZTNA) provider Meta Networks in a transaction valued at roughly $120 million. [Read More]
Cisco has released patches for tens of vulnerabilities in its products, including a Critical flaw impacting Nexus 9000 switches. [Read More]
Citrix said hackers had access to its network for five months and they may have stolen names, SSNs and financial information relating to current and former employees. [Read More]
Cisco Talos researchers find nearly a dozen vulnerabilities in Sierra Wireless AirLink gateways and routers, including serious flaws that can be exploited to change system settings, execute arbitrary code, and modify passwords. [Read More]
Researchers believe that at least 40 different organizations across 13 countries have been compromised by elite state-sponsored hackers using DNS hijacking campaigns. [Read More]
Cisco releases patches for 30 vulnerabilities, including a critical bug impacting ASR 9000 Series Aggregation Services Routers running IOS XR 64-bit software. [Read More]
Fortinet agreed a deal worth $545,000 to settle a whistleblower lawsuit that alleged that Fortinet had supplied mislabeled goods manufactured by countries including China, falsely representing the goods were in compliance with the U.S Trade Agreements Act (TAA). [Read More]
A new type of DDoS attack that abuses the HTML5 Ping-based hyperlink auditing feature has been detected following a major attack emanating from primarily Chinese-speaking mobile users of the QQBrowser. [Read More]
Russian lawmakers approve a bill that would allow Moscow to cut the country's internet traffic from foreign servers, in a key second reading paving the way for legislation that activists fear is a step towards online isolation. [Read More]
Verizon patches a potentially serious command injection vulnerability affecting its Fios Quantum Gateway routers, but exploitation is not straightforward. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Danelle Au's picture
Deep learning is an ideal technology to address the volume and velocity of the current threat environment, and can be used to detect a variety of different threats, even ones that seemingly look novel.
John Maddison's picture
Enabling the networks of tomorrow requires organizations to radically reimagine the security solutions they have in place today.
Laurence Pitt's picture
Well deployed automation – a combination of orchestration tools, data leveraged for analytics, machine-learning and artificial intelligence – can provide an edge for an enterprise in today’s ever evolving 24/7 threat landscape.
Gunter Ollmann's picture
75 years may separate War World II from cloud SIEM, but we’re on the cusp of being able to apply the hard-earned learnings from Abraham Wald in our latest adversarial conflict – the cyberwar.
Torsten George's picture
Shifting traditional perimeter-based enterprise security strategies to a Zero Trust approach provides more robust prevention, detection, and incident response capabilities to protect continuously expanding attack surfaces.
Ashley Arbuckle's picture
As organizations digitize their business and make these shifts, they need to know what and who they can trust.
John Maddison's picture
While maintaining consistent network visibility and control is table stakes for any security strategy, they are becoming increasingly difficult to maintain.
Ashley Arbuckle's picture
Through market consolidation, organizations can derive exponentially more value from their security tools.
Ashley Arbuckle's picture
Network Segmentation can prevent lateral movement and effectively improve security, and is a continuous journey that every organization should take.
John Maddison's picture
Security frameworks need to see and adapt to network changes, share and correlate threat intelligence, and respond to threats as a unified system.