Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Cisco has released patches for 11 vulnerabilities in its products, including multiple flaws that impact Cisco UCS Manager, FXOS, and NX-OS software. [Read More]
Mozilla is rolling out encrypted DNS-over-HTTPS (DoH) by default for its Firefox users in the United States. [Read More]
A threat actor, likely a state-sponsored cyberespionage group, has used a sophisticated technique to allow its malware to communicate with C&C servers across firewalls. [Read More]
Cisco launches SecureX, a cloud-native security platform designed to improve visibility, deliver analytics, and automate common security workflows. [Read More]
Fidelis Cybersecurity has announced a raft of enhancements to its Fidelis Elevate platform, which comprises a network product, an endpoint product, and a deception product. [Read More]
It is important to inspect network traffic and check TLS certificate details, while also paying attention to unusual or unexpected volumes of https traffic to unknown domains or using invalid or forged TLS certificates. [Read More]
Huawei was hit with US criminal charges in a 16-count indictment alleging a "decades-long" effort to steal trade secrets from American companies. [Read More]
Enterprise SOC-as-a-Service company Cysiv has raised $26 million in a Series A funding round. [Read More]
China's Huawei can secretly tap into communications through the networking equipment it sells globally, a U.S. official claimed. [Read More]
Randori launches automated attack platform that allows customers to safely launch real-world attacks against their production assets and help defenders train like adversaries. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

John Maddison's picture
Network connections that can change instantaneously in response to shifting business requirements can take a security solution minutes or hours to be reconfigured. And that lag time is prime for exploitation.
Laurence Pitt's picture
Working remotely should be a positive experience. Here are a few simple suggestions that may help during this time of change.
Craig Harber's picture
Many organizations are not aware that their network sensors are improperly or inefficiently deployed because they do not have a full understanding of how to act on the network traffic being collected.
John Maddison's picture
Physical and virtual security appliances traditionally suffer from performance challenges, especially when it comes to critical functions such as inspecting encrypted traffic.
John Maddison's picture
Outpacing your security capacity with digital innovation is a formula for disaster that may take you out of the running in today’s highly competitive digital marketplace entirely.
Craig Harber's picture
Deep visibility allows organizations to see how different pieces of the overall cyber terrain are communicating with one another, enabling them to highlight potential or existing attack vectors.
Justin Fier's picture
Use of artificial intelligence (AI) will change the role of security teams, and improve companies’ ability to defend their data and networks from future compromises, breaches, and sabotage.
Craig Harber's picture
By using decoys to capture adversary tools, understand their techniques, and detect their actions during early attack phases, security teams can detect problems sooner and avoid long dwell times.
Laurence Pitt's picture
DDoS attacks are moving away from simply sending out broadcast traffic for massive disruption toward more complex and targeted attacks hitting the application layer of the network that can take down specific applications or services.
Craig Harber's picture
Cybersecurity teams need actionable insight into the latest techniques, tactics and procedures being used by attackers and a continuous understanding of their environment and anomalous behavior.