Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The Internet Engineering Task Force (IETF) has published RFC8915, its proposed standard for network time security (NTS). [Read More]
Google this week announced the availability of Chronicle Detect, a threat detection solution for enterprises from Google Cloud. [Read More]
Microsoft announced on Tuesday at its Ignite conference that it has extended its threat protection portfolio and it has unified some of its security solutions under the Microsoft Defender brand. [Read More]
Kognos has emerged from stealth mode with an autonomous XDR platform that uses AI to help organizations efficiently detect, investigate and respond to attacks. [Read More]
Palo Alto Networks has patched several critical and high-severity DoS and code execution vulnerabilities in PAN-OS. [Read More]
A new Malicious Domain Blocking and Reporting (MDBR) service will help organizations improve security by preventing IT systems from connecting to malicious domains. [Read More]
Cisco says that hackers are targeting two unpatched vulnerabilities in the DVMRP feature of IOS XR software that runs on many carrier-grade routers. [Read More]
Network security policy management provider FireMon has secured $40 million in debt financing from Silicon Valley Bank (SVB). [Read More]
A hacking group believed to be linked to the Iranian government was observed targeting a critical vulnerability that F5 Networks addressed in its BIG-IP application delivery controller (ADC) in early July. [Read More]
Cisco over the weekend published information on a vulnerability (CVE-2020-3566) in the IOS XR software that could be exploited to cause a denial of service condition. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Gunter Ollmann's picture
The phrase “assume breach” has been transformational to enterprise security investment and defensive strategy for a few years but may now be close to retirement.
Laurence Pitt's picture
To minimize the effect of an attack, an automated response is vital, which can reduce the amount of time between infection and resolution.
John Maddison's picture
By combining verifiable trust, intent-based segmentation, and integrated security, organizations can establish a trustworthy, security-driven networking strategy.
John Maddison's picture
Smart businesses are learning that SD-WAN can play a critical role in quickly—and securely—rolling out new networking environments, and connecting resources and users to data and applications.
Laurence Pitt's picture
Every business is likely to be subject to cyberattacks at some point, and the option is to either take on the cost of putting measures in place before it happens or paying to clean up after.
John Maddison's picture
The rate at which recent networking changes have had to occur, and the speed at which cybercriminals have been able to respond, teach us clearly what is needed going forward to ensure ongoing proactive cyber protection.
Laurence Pitt's picture
For an MSP looking to grow business, the convergence of SD-WAN and security, along with the transitional needs of customers, translates to opportunity.
John Maddison's picture
Network connections that can change instantaneously in response to shifting business requirements can take a security solution minutes or hours to be reconfigured. And that lag time is prime for exploitation.
Laurence Pitt's picture
Working remotely should be a positive experience. Here are a few simple suggestions that may help during this time of change.
Craig Harber's picture
Many organizations are not aware that their network sensors are improperly or inefficiently deployed because they do not have a full understanding of how to act on the network traffic being collected.