Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Private equity firm Symphony Technology Group announced the merger of McAfee Enterprise and the newly acquired FireEye Products into a single pure-play cybersecurity company. [Read More]
Researchers discover a threat actor setting up a fake Amnesty International website to distribute phony anti-virus software. [Read More]
Mariana Trench is an open-source tool that Facebook's security team has used internally to identify vulnerabilities in Android and Java applications. [Read More]
Akamai adds new capabilities to help customers thwart ransomware attacks by blocking the spread of malware within an already-compromised enterprise. [Read More]
The newly discovered Tomiris backdoor contains technical artifacts that suggest the possibility of common authorship or shared development practices with the group that executed the SolarWinds supply chain compromise. [Read More]
This is the 16th documented in-the-wild zero-day exploitation of security defects in Apple’s iOS and macOS platforms so far this year. [Read More]
Cowbell Cyber aims to fill a gap in the cyber-insurance ecosystem with products that continuously monitor customers systems to find weaknesses that can be fixed so that insurance can be offered with greater confidence. [Read More]
The company will use the investment to expand marketing and sales initiatives and accelerate product roadmap. [Read More]
Netgear warns that an attacker on the same network as a vulnerable device could intercept and manipulate router traffic to execute code as root. [Read More]
Researchers have discovered nearly a dozen vulnerabilities in widely used network management products from Nagios. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Laurence Pitt's picture
Supporting and securing systems now operating in a hybrid model with remote working still normal but staff also slowly returning to the office, the risk of cyberattack increases.
Marie Hattar's picture
Security is never static, and networks will always be evolving, so make sure you’re continuously validating your security posture and ready for whatever comes next.
John Maddison's picture
As enterprises adopt 5G networks and services to enable digital innovation across new network edges, they are also introducing new risks.
Marc Solomon's picture
As you determine what security technologies to invest in, develop not only a technology roadmap, but also include and align an operational roadmap.
Derek Manky's picture
Although every network environment is unique, there are steps any organization can begin to implement now to reduce their risk from ransomware and other advanced threats.
Gordon Lawson's picture
While obscurity is an offensive tool for attackers, it also represents a defensive measure for organizations. Let’s consider the benefits of concealing network infrastructure and activity from the outside world to reduce the enterprise attack surface.
John Maddison's picture
The best defense in depth strategy is one that enables multiple tools, deployed across the distributed network—including endpoints, clouds, and applications—to work as a unified solution to detect and respond to threats.
Laurence Pitt's picture
Using Machine Learning (ML) with AI means that security tools can be trained to work better with data and the ML system will be able to make recommendations for improvements.
John Maddison's picture
In today’s highly dynamic environments, integration needs to go beyond just the security elements of a platform.
John Maddison's picture
Security tools, regardless of where they have been deployed, need to be able leverage common security intelligence feeds and share alerts and threat data with other security tools.