Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Zoom has rolled out a high-priority patch for macOS users with a warning that hackers could abuse the software flaw to connect to and control Zoom Apps. [Read More]
Palo Alto Networks and Aruba have each announced patches for serious authentication bypass vulnerabilities affecting their products. [Read More]
Microsoft releases patches to address more than 90 security defects affecting products in the Windows ecosystem but there's no fix yet for a pair of exploited Exchange Server bugs. [Read More]
Adobe ships security patches for 29 documented vulnerabilities across multiple enterprise-facing products. [Read More]
A new Silicon Valley startup called Endor Labs has closed a $25 million seed-stage funding round to build a dependency lifecycle management platform to secure software supply chain. [Read More]
Quantum-secure networking developer Qunnect raises $8 million in a Series A funding round led by Airbus Ventures. [Read More]
A San Francisco jury on Wednesday found former Uber security chief Joe Sullivan guilty of covering up a 2016 data breach and concealing information on a felony from law enforcement. [Read More]
The new funding gives Minneapolis-based NetSPI an extended runway to compete and find profits in the fast-growing attack surface management business. [Read More]
As per Binding Operational Directive 23-01, federal agencies have six months to take the necessary actions to improve asset visibility and vulnerability detection within their networks. [Read More]
If you haven’t tested your mitigation capability recently – or been the victim of an attack – you probably don’t know how well you can detect and respond to one, which could put your organization at risk. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

Marie Hattar's picture
In order to deliver on the promise of 5G, we need new industry standards for security, testing, and training to proactively combat 5G cyber threats and minimize risks.
Gordon Lawson's picture
For red teams, using an obfuscated network for testing offers the advantage of hiding who is performing the attack and where it is originating, for a more real-life context
John Maddison's picture
Recent changes have resulted in a proliferation of devices and users working from anywhere, which has expanded the digital attack surface and exposed more applications, devices, data, and users to risk.
John Maddison's picture
Zero-trust network access (ZTNA) simplifies secure connectivity by providing seamless, per-use access to applications, no matter where the user or application may be located.
Torsten George's picture
While there is no silver bullet to prevent cybersecurity attacks, ZTNA has become a necessity for organizations on their digital transformation journey by allowing to minimize the attack surface while ensuring the productivity of remote workers.
John Maddison's picture
Organizations considering ZTNA should look for these three essential components as a minimum when evaluating any solution.
Torsten George's picture
As it has become clear that remote/hybrid work is here to stay, IT security practitioners must figure out how to enable a secure and resilient anywhere workforce to minimize their future risk exposure.
Laurence Pitt's picture
We have had to accelerate into remote and now hybrid working models over the last year and a half. Now that we are getting back to work, there is still much to do as everything moves fast.
Marc Solomon's picture
Evolving our definition of detection to encompass greater breadth and depth of understanding through internal and external data aggregation, correlation and investigation, delivers the information we need to execute faster with confidence.
John Maddison's picture
Trying to keep track of the who, what, when, where, and how of today’s network has broken the backs of many SecOps teams.