Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A critical vulnerability discovered in a firewall appliance made by Genua could be very useful to threat actors once they’ve gained access to an organization’s network. [Read More]
IT asset management company Axonius has raised $100 million in Series D funding at more than $1 billion valuation, the company told SecurityWeek. [Read More]
HYAS, a Victoria, Canada-based provider of threat intelligence based on adversary infrastructure, has closed a $16 million Series B round of funding led by S3 Ventures. [Read More]
NEWS ANALYSIS: CrowdStrike said it will shell out a whopping $400 million to snap up a Splunk competitor and present itself as the security data lake for enterprise customers. We look at how the move affects the EDR, xDR and SIEM categories. [Read More]
Apple has published an updated Platform Security Guide, providing detailed technical explanations on the security features and technology implemented in its products. [Read More]
Enterprise cybersecurity powerhouse Palo Alto spends $156 million to acquire an early-stage DevOps security startup. [Read More]
France's national cybersecurity agency is publicly blaming the Sandworm APT group for a string of long-term intrusions at European software and web hosting organizations. [Read More]
Forescout researchers warn that improperly generated ISNs (Initial Sequence Numbers) leave TCP connections exposed to malicious hacker attacks. [Read More]
CYE, a Tel Aviv, Israel-based company on a mission to help companies identify “real-life” cyber risks by leveraging humans and machines, has raised $100 million in growth funding through a financing round led by private equity firm EQT. [Read More]
Microsoft drops a mega patch batch for February: 56 documented vulnerabilities, 11 rated critical, one under active attack. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

John Maddison's picture
Security tools, regardless of where they have been deployed, need to be able leverage common security intelligence feeds and share alerts and threat data with other security tools.
Derek Manky's picture
If the history of cybersecurity has taught us anything, it’s that any time that we implement a new tool, a new capability, or a new functionality, security threats follow.
Laurence Pitt's picture
In the world of information security, it’s hard to flip between internet browser tabs without hearing a new term, and one of the biggest in 2020 was Secure Access Service Edge (SASE).
John Maddison's picture
Multi-vendor environments with disparate security solutions that don’t integrate when deployed make it impossible for organizations to securely use the flexible network environments they need to compete effectively.
Tim Bandos's picture
Keeping a ‘six foot distance’ between our digital home life and digital work life can go a long way when it comes to safeguarding our most sensitive data, too.
AJ Nash's picture
Knowing that threat intelligence is readily available and proving its worth is one thing, understanding how to use it within your security operations program is quite another.
Laurence Pitt's picture
To reap the benefits of 5G and ensure security, organizations must be smarter, fully educated and willing to work alongside the tech.
John Maddison's picture
SD-WAN connections are designed to constantly shift and adjust, replacing one connection that has become unstable with another without interrupting application performance.
Gunter Ollmann's picture
The phrase “assume breach” has been transformational to enterprise security investment and defensive strategy for a few years but may now be close to retirement.
Laurence Pitt's picture
To minimize the effect of an attack, an automated response is vital, which can reduce the amount of time between infection and resolution.