Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Randori launches automated attack platform that allows customers to safely launch real-world attacks against their production assets and help defenders train like adversaries. [Read More]
Serious vulnerabilities affecting Cisco Small Business Switches can be exploited remotely and without authentication to obtain sensitive device information and to launch DoS attacks. [Read More]
Britain said it would allow Huawei to provide limited access to build parts of its new high-speed 5G network. [Read More]
How and to what extent solving the cybersecurity problems inherent in the global supply chain could provide confidence in Huawei equipment is debatable and fiercely debated. [Read More]
Prime Minister Boris Johnson discussed telecoms security with US President Donald Trump as he prepares to announce if Britain will use China's Huawei in its 5G networks, officials said Jan. 25. [Read More]
A critical vulnerability in the Cisco Firepower Management Center (FMC) could allow a remote attacker to bypass authentication and execute arbitrary actions on affected devices as administrator. [Read More]
A hardcoded SSH public key in Fortinet’s Security Information and Event Management FortiSIEM can be abused to access the FortiSIEM Supervisor. [Read More]
A bill introduced by Senator Tom Cotton would ban the sharing of intelligence with countries that use Huawei technologies in their 5G networks. [Read More]
Serious vulnerabilities found by a researcher in Cisco Data Center Network Manager can be chained for high-impact attacks. [Read More]
PoC exploits have been released for remote command execution and information disclosure vulnerabilities affecting many D-Link routers. [Read More]

FEATURES, INSIGHTS // Network Security

rss icon

John Maddison's picture
Physical and virtual security appliances traditionally suffer from performance challenges, especially when it comes to critical functions such as inspecting encrypted traffic.
John Maddison's picture
Outpacing your security capacity with digital innovation is a formula for disaster that may take you out of the running in today’s highly competitive digital marketplace entirely.
Craig Harber's picture
Deep visibility allows organizations to see how different pieces of the overall cyber terrain are communicating with one another, enabling them to highlight potential or existing attack vectors.
Justin Fier's picture
Use of artificial intelligence (AI) will change the role of security teams, and improve companies’ ability to defend their data and networks from future compromises, breaches, and sabotage.
Craig Harber's picture
By using decoys to capture adversary tools, understand their techniques, and detect their actions during early attack phases, security teams can detect problems sooner and avoid long dwell times.
Laurence Pitt's picture
DDoS attacks are moving away from simply sending out broadcast traffic for massive disruption toward more complex and targeted attacks hitting the application layer of the network that can take down specific applications or services.
Craig Harber's picture
Cybersecurity teams need actionable insight into the latest techniques, tactics and procedures being used by attackers and a continuous understanding of their environment and anomalous behavior.
Laurence Pitt's picture
The best way to stay ahead of threats while enabling business agility to keep up with the latest technology advances is to look to the network as the first line of defense.
Justin Fier's picture
The arrival of 5G will fuel an explosion of never-before-seen IoT machines, introducing uncharted vulnerabilities and opening the door for cyber-criminals to compromise our increasingly intertwined cities.
Craig Harber's picture
Because attackers will exploit the paths of least resistance and move laterally through the enterprise, visibility must include all managed and unmanaged assets (enterprise IoT, shadow IoT, legacy systems, etc.)