Security Experts:

long dotted


Mozilla is rolling out encrypted DNS-over-HTTPS (DoH) by default for its Firefox users in the United States. [Read More]
A threat actor, likely a state-sponsored cyberespionage group, has used a sophisticated technique to allow its malware to communicate with C&C servers across firewalls. [Read More]
Cisco launches SecureX, a cloud-native security platform designed to improve visibility, deliver analytics, and automate common security workflows. [Read More]
Fidelis Cybersecurity has announced a raft of enhancements to its Fidelis Elevate platform, which comprises a network product, an endpoint product, and a deception product. [Read More]
It is important to inspect network traffic and check TLS certificate details, while also paying attention to unusual or unexpected volumes of https traffic to unknown domains or using invalid or forged TLS certificates. [Read More]
Huawei was hit with US criminal charges in a 16-count indictment alleging a "decades-long" effort to steal trade secrets from American companies. [Read More]
Enterprise SOC-as-a-Service company Cysiv has raised $26 million in a Series A funding round. [Read More]
China's Huawei can secretly tap into communications through the networking equipment it sells globally, a U.S. official claimed. [Read More]
Randori launches automated attack platform that allows customers to safely launch real-world attacks against their production assets and help defenders train like adversaries. [Read More]
Serious vulnerabilities affecting Cisco Small Business Switches can be exploited remotely and without authentication to obtain sensitive device information and to launch DoS attacks. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Craig Harber's picture
Many organizations are not aware that their network sensors are improperly or inefficiently deployed because they do not have a full understanding of how to act on the network traffic being collected.
John Maddison's picture
Physical and virtual security appliances traditionally suffer from performance challenges, especially when it comes to critical functions such as inspecting encrypted traffic.
John Maddison's picture
Outpacing your security capacity with digital innovation is a formula for disaster that may take you out of the running in today’s highly competitive digital marketplace entirely.
Craig Harber's picture
Deep visibility allows organizations to see how different pieces of the overall cyber terrain are communicating with one another, enabling them to highlight potential or existing attack vectors.
Justin Fier's picture
Use of artificial intelligence (AI) will change the role of security teams, and improve companies’ ability to defend their data and networks from future compromises, breaches, and sabotage.
Craig Harber's picture
By using decoys to capture adversary tools, understand their techniques, and detect their actions during early attack phases, security teams can detect problems sooner and avoid long dwell times.
Laurence Pitt's picture
DDoS attacks are moving away from simply sending out broadcast traffic for massive disruption toward more complex and targeted attacks hitting the application layer of the network that can take down specific applications or services.
Craig Harber's picture
Cybersecurity teams need actionable insight into the latest techniques, tactics and procedures being used by attackers and a continuous understanding of their environment and anomalous behavior.
Laurence Pitt's picture
The best way to stay ahead of threats while enabling business agility to keep up with the latest technology advances is to look to the network as the first line of defense.
Justin Fier's picture
The arrival of 5G will fuel an explosion of never-before-seen IoT machines, introducing uncharted vulnerabilities and opening the door for cyber-criminals to compromise our increasingly intertwined cities.