Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Britain said it would allow Huawei to provide limited access to build parts of its new high-speed 5G network. [Read More]
How and to what extent solving the cybersecurity problems inherent in the global supply chain could provide confidence in Huawei equipment is debatable and fiercely debated. [Read More]
Prime Minister Boris Johnson discussed telecoms security with US President Donald Trump as he prepares to announce if Britain will use China's Huawei in its 5G networks, officials said Jan. 25. [Read More]
A critical vulnerability in the Cisco Firepower Management Center (FMC) could allow a remote attacker to bypass authentication and execute arbitrary actions on affected devices as administrator. [Read More]
A hardcoded SSH public key in Fortinet’s Security Information and Event Management FortiSIEM can be abused to access the FortiSIEM Supervisor. [Read More]
A bill introduced by Senator Tom Cotton would ban the sharing of intelligence with countries that use Huawei technologies in their 5G networks. [Read More]
Serious vulnerabilities found by a researcher in Cisco Data Center Network Manager can be chained for high-impact attacks. [Read More]
PoC exploits have been released for remote command execution and information disclosure vulnerabilities affecting many D-Link routers. [Read More]
Firefox users will be getting private and secure encrypted Domain Name System (DNS) services from NextDNS, after Mozilla added the company to its Trusted Recursive Resolver (TRR) program. [Read More]
Critical infrastructure protection company OPSWAT acquires Network Access Control (NAC) and Software Defined Perimeter (SDP) solutions provider Impulse. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Craig Harber's picture
Because attackers will exploit the paths of least resistance and move laterally through the enterprise, visibility must include all managed and unmanaged assets (enterprise IoT, shadow IoT, legacy systems, etc.)
John Maddison's picture
Security-Driven Networking is a new, strategic approach to security that enables the seamless expansion of network environments and services without ever compromising on security.
Laurence Pitt's picture
Adoption of 5G not only exposes potential new attack surfaces, but given execution happens at super-speed, it also changes the required nature of any defense.
John Maddison's picture
Many cybersecurity companies claim to have introduced AI capabilities into their solutions, but most fall short of true AI because their underlying infrastructure is too small or their learning models are incomplete.
Ashley Arbuckle's picture
While we can’t turn our attention away from gathering data, we must devise new ways to deal with the onslaught of data. Humans simply can’t keep up, and the problem is getting worse.
Ashley Arbuckle's picture
Breach and Attack Simulation (BAS) tools aid in maintaining a fundamental level of security assurance more quickly and cost effectively than traditional approaches.
John Maddison's picture
Analyzing threat trends can provide security professionals with insights into how to better protect their organizations from the latest cyber threats.
Gunter Ollmann's picture
While cloud SIEM may be new for most organizations, its ability to harness the innate capabilities of public cloud are transforming security operations.
Laurence Pitt's picture
While security spending is on the increase, it’s up to us as experienced security practitioners to make the most of this spend with a clear ROI that can be reported to the business.
Torsten George's picture
Using Zero Trust Privilege services can extend corporate security policies and best practices to cloud environments, while reducing costs, improving scalability across multi-VPCs, -SaaS, and -directory environments, and minimizing security blind spots through centralized management.