Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

IBM has disclosed several vulnerabilities affecting powerline extenders from Tenda and says the vendor has ignored its emails and phone calls. [Read More]
Apple has acquired Fleetsmith, a company that specializes in solutions that automate the setup, patching and security of Macs, iPhones, iPads and Apple TV devices. [Read More]
Applying micro-segmentation to endpoints can help stop attackers from moving laterally within an organization after the initial breach. [Read More]
A high-severity vulnerability found in IBM’s Maximo asset management product makes it easier for hackers to move around in enterprise networks. [Read More]
Palo Alto Networks has unveiled a new ML-powered firewall, a firewall for Kubernetes, and an IoT security solution. [Read More]
AI company SparkCognition and German industrial giant Siemens have teamed up to offer an industrial security solution for energy companies. [Read More]
Threat detection firm Vectra has integrated its network threat detection and response (NDR) Cognito platform with Microsoft Defender and Microsoft Azure Sentinel. [Read More]
A vulnerability related to the IP-in-IP tunneling protocol that can be exploited for DoS attacks and to bypass security controls has been found to impact devices from Cisco and other vendors. [Read More]
Cisco said it would acquire privately held network intelligence firm ThousandEyes, as the networking giant looks to boost nework visibility and intelligence across its enterprise networking, cloud and application services portfolios. [Read More]
Palo Alto Networks has patched over two dozen vulnerabilities in PAN-OS, including many that have a critical or high severity rating and a few that can be exploited without authentication. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

John Maddison's picture
By combining verifiable trust, intent-based segmentation, and integrated security, organizations can establish a trustworthy, security-driven networking strategy.
John Maddison's picture
Smart businesses are learning that SD-WAN can play a critical role in quickly—and securely—rolling out new networking environments, and connecting resources and users to data and applications.
Laurence Pitt's picture
Every business is likely to be subject to cyberattacks at some point, and the option is to either take on the cost of putting measures in place before it happens or paying to clean up after.
John Maddison's picture
The rate at which recent networking changes have had to occur, and the speed at which cybercriminals have been able to respond, teach us clearly what is needed going forward to ensure ongoing proactive cyber protection.
Laurence Pitt's picture
For an MSP looking to grow business, the convergence of SD-WAN and security, along with the transitional needs of customers, translates to opportunity.
John Maddison's picture
Network connections that can change instantaneously in response to shifting business requirements can take a security solution minutes or hours to be reconfigured. And that lag time is prime for exploitation.
Laurence Pitt's picture
Working remotely should be a positive experience. Here are a few simple suggestions that may help during this time of change.
Craig Harber's picture
Many organizations are not aware that their network sensors are improperly or inefficiently deployed because they do not have a full understanding of how to act on the network traffic being collected.
John Maddison's picture
Physical and virtual security appliances traditionally suffer from performance challenges, especially when it comes to critical functions such as inspecting encrypted traffic.
John Maddison's picture
Outpacing your security capacity with digital innovation is a formula for disaster that may take you out of the running in today’s highly competitive digital marketplace entirely.