Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

An expired domain allowed a researcher to hijack the country code top-level domain (TLD) of Congo. [Read More]
The Canadian data security startup closes a Series A funding round to expand its data discovery and classification offerings. [Read More]
More than 70 vulnerabilities affecting small business routers from Cisco will not receive patches as they have reached end of life. [Read More]
German software maker SAP has published 10 bulletins with fixes for a range of serious security vulnerabilities. [Read More]
Microsoft's first batch of patches for 2021 includes a fix for a critical Microsoft Defender vulnerability that's been actively exploited. [Read More]
The Microsoft Defender for Endpoint on Linux hits GA milestone and now provides endpoint detection and response (EDR) capabilities to all users. [Read More]
Multiple serious security vulnerabilities were addressed in GPU drivers and vGPU software. [Read More]
Ongoing coverage of the SolarWinds Orion attacks and useful resources, including analysis and indicators of compromise (IOC). Check back often for updates. [Read More]
Red Hat buys an innovative container security startup and announced plans to open-source the technology at a later date. [Read More]
Citrix has released firmware updates for its ADC and Gateway appliances after threat actors started abusing them to launch DDoS attacks. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Laurence Pitt's picture
In the world of information security, it’s hard to flip between internet browser tabs without hearing a new term, and one of the biggest in 2020 was Secure Access Service Edge (SASE).
John Maddison's picture
Multi-vendor environments with disparate security solutions that don’t integrate when deployed make it impossible for organizations to securely use the flexible network environments they need to compete effectively.
Tim Bandos's picture
Keeping a ‘six foot distance’ between our digital home life and digital work life can go a long way when it comes to safeguarding our most sensitive data, too.
AJ Nash's picture
Knowing that threat intelligence is readily available and proving its worth is one thing, understanding how to use it within your security operations program is quite another.
Laurence Pitt's picture
To reap the benefits of 5G and ensure security, organizations must be smarter, fully educated and willing to work alongside the tech.
John Maddison's picture
SD-WAN connections are designed to constantly shift and adjust, replacing one connection that has become unstable with another without interrupting application performance.
Gunter Ollmann's picture
The phrase “assume breach” has been transformational to enterprise security investment and defensive strategy for a few years but may now be close to retirement.
Laurence Pitt's picture
To minimize the effect of an attack, an automated response is vital, which can reduce the amount of time between infection and resolution.
John Maddison's picture
By combining verifiable trust, intent-based segmentation, and integrated security, organizations can establish a trustworthy, security-driven networking strategy.
John Maddison's picture
Smart businesses are learning that SD-WAN can play a critical role in quickly—and securely—rolling out new networking environments, and connecting resources and users to data and applications.