Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Identity management provider Elisity closes Series A funding to help scale and meet demand for its cloud-delivered cybersecurity platform. [Read More]
Following a major software supply chain compromise that exposed data for several major companies, CodeCov plans to kill off the Bash Uploader tool that was responsible for the breach. [Read More]
Security researchers at Group-IB believe that Chinese nation-state threat actor APT41 performed the cyberattack against aviation IT firm SITA [Read More]
CrowdStrike warns that SonicWall patches released in 2019 do not properly address a vulnerability in the company’s Secure Remote Access (SRA) devices. [Read More]
Microsoft warns that attackers are simultaneously deploying TensorFlow pods on multiple Kubernetes clusters to mine cryptocurrency. [Read More]
The new Amazon Sidewalk mesh network links tens of millions of Amazon smart devices, each sharing a tiny sliver of their bandwidth to provide a wide network of connectivity even when and where WiFi service is poor or unavailable. What are the privacy and security implications? [Read More]
The Cisco Smart Install protocol is still being abused in attacks — the latest example is another hacktivist attack — 5 years after Cisco issued its first warning. [Read More]
SAP releases patches for a total of 11 security flaws in NetWeaver, five of which are rated high-severity. [Read More]
Adobe's June batch of security patches address a swathe of potentially dangerous vulnerabilities in Adobe Acrobat and Reader, Adobe Photoshop, and the ever-present Adobe Creative Cloud Desktop Application. [Read More]
Navistar International Corporation confirms data stolen in cyberattack that affected some operations. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Marie Hattar's picture
Security is never static, and networks will always be evolving, so make sure you’re continuously validating your security posture and ready for whatever comes next.
John Maddison's picture
As enterprises adopt 5G networks and services to enable digital innovation across new network edges, they are also introducing new risks.
Marc Solomon's picture
As you determine what security technologies to invest in, develop not only a technology roadmap, but also include and align an operational roadmap.
Derek Manky's picture
Although every network environment is unique, there are steps any organization can begin to implement now to reduce their risk from ransomware and other advanced threats.
Gordon Lawson's picture
While obscurity is an offensive tool for attackers, it also represents a defensive measure for organizations. Let’s consider the benefits of concealing network infrastructure and activity from the outside world to reduce the enterprise attack surface.
John Maddison's picture
The best defense in depth strategy is one that enables multiple tools, deployed across the distributed network—including endpoints, clouds, and applications—to work as a unified solution to detect and respond to threats.
Laurence Pitt's picture
Using Machine Learning (ML) with AI means that security tools can be trained to work better with data and the ML system will be able to make recommendations for improvements.
John Maddison's picture
In today’s highly dynamic environments, integration needs to go beyond just the security elements of a platform.
John Maddison's picture
Security tools, regardless of where they have been deployed, need to be able leverage common security intelligence feeds and share alerts and threat data with other security tools.
Derek Manky's picture
If the history of cybersecurity has taught us anything, it’s that any time that we implement a new tool, a new capability, or a new functionality, security threats follow.