Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A chain of vulnerabilities in MikroTik routers could allow an attacker to enable a backdoor on a vulnerable system. [Read More]
Fortinet acquires endpoint security company enSilo in an effort to enhance and strengthen its solutions. [Read More]
Cloud networking and security services provider Aviatrix raises $40 million in a Series C funding round, which brings the total raised by the company to over $76 million. [Read More]
Network security firm Palo Alto Networks is planning to increase the price of its hardware products by a 5%, citing impact from recent tariffs for imported components. [Read More]
A group of security researchers from German universities has devised a new class of web cache poisoning attacks that could render victim services unreachable. [Read More]
AWS customers experience service interruptions caused by a DDoS attack aimed at DNS servers. [Read More]
Outdated and unsupported operating systems are still present and they still pose a serious risk in many industrial organizations. [Read More]
A critical vulnerability allows remote, unauthenticated attackers to gain unauthorized access to Cisco Aironet access points with elevated privileges. [Read More]
A critical vulnerability patched by Sophos in its Cyberoam firewall appliances allows a remote, unauthenticated attacker to execute arbitrary commands with root privileges. [Read More]
A critical remote code execution vulnerability in several D-Link routers that reached their end of life remains unpatched. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Craig Harber's picture
Because attackers will exploit the paths of least resistance and move laterally through the enterprise, visibility must include all managed and unmanaged assets (enterprise IoT, shadow IoT, legacy systems, etc.)
John Maddison's picture
Security-Driven Networking is a new, strategic approach to security that enables the seamless expansion of network environments and services without ever compromising on security.
Laurence Pitt's picture
Adoption of 5G not only exposes potential new attack surfaces, but given execution happens at super-speed, it also changes the required nature of any defense.
John Maddison's picture
Many cybersecurity companies claim to have introduced AI capabilities into their solutions, but most fall short of true AI because their underlying infrastructure is too small or their learning models are incomplete.
Ashley Arbuckle's picture
While we can’t turn our attention away from gathering data, we must devise new ways to deal with the onslaught of data. Humans simply can’t keep up, and the problem is getting worse.
Ashley Arbuckle's picture
Breach and Attack Simulation (BAS) tools aid in maintaining a fundamental level of security assurance more quickly and cost effectively than traditional approaches.
John Maddison's picture
Analyzing threat trends can provide security professionals with insights into how to better protect their organizations from the latest cyber threats.
Gunter Ollmann's picture
While cloud SIEM may be new for most organizations, its ability to harness the innate capabilities of public cloud are transforming security operations.
Laurence Pitt's picture
While security spending is on the increase, it’s up to us as experienced security practitioners to make the most of this spend with a clear ROI that can be reported to the business.
Torsten George's picture
Using Zero Trust Privilege services can extend corporate security policies and best practices to cloud environments, while reducing costs, improving scalability across multi-VPCs, -SaaS, and -directory environments, and minimizing security blind spots through centralized management.