Risk-based vulnerability management a better form of cyber defense

Risk-based vulnerability management a better form of cyber defense

By consolidating vulnerability management tools and adding AI, risk-based vulnerability management protects the entire attack surface.

12/03/18

Zeek: A free, powerful way to monitor networks, detect threats

Zeek: A free, powerful way to monitor networks, detect threats

Bro may have a new name -- Zeek -- but the platform has the same rich functionality for security professionals to help them analyze network data and detect threats.

10/15/18

Google Chrome 70 is coming. Are your security certificates in order?

Google Chrome 70 is coming. Are your security certificates in order?

All Symantec-issued digital certificates will be deprecated on Google Chrome by mid-October. Former Symantec customers must ensure their websites are compliant.

10/01/18

EDR is dead! Long live XDR!

EDR is dead! Long live XDR!

Endpoint detection and response has been a valuable technology for years, but its limited view is leaving many blind spots. It’s time the industry evolved to XDR.

09/06/18

Securing IoT devices: Fortinet's FortiNAC automates the process

Securing IoT devices: Fortinet's FortiNAC automates the process

Fortinet’s network access control solution, FortiNAC, automatically discovers, controls, and enforces Internet of Things (IoT) endpoints.

09/05/18

Arista Networks PICs its spot In security

Arista Networks PICs its spot In security

After establishing itself as an innovative network vendor, Arista has moved into the security market, addressing the challenges of 'places in cloud.'

08/21/18

Reduce breach risk and costs with security resilience
Q&A

Reduce breach risk and costs with security resilience

Companies must prepare for when a breach occurs – because chances are, it will happen. Ixia’s Keith Bromley says network security resilience can help.

06/27/18

Cato Networks adds threat hunting to its SD-WAN services

Cato Networks adds threat hunting to its SD-WAN services

Cato Threat Hunting System includes algorithms and procedures to alert on threats -- without adding endpoint or network monitoring tools to the customer network.

05/24/18

End-to-end security requires multi-vendor automation

End-to-end security requires multi-vendor automation

To make it easier to use security tools from multiple vendors, as well as bake security into the development process, Fortinet introduces Fabric Connectors and DevOps integration.

05/23/18

RSA roundup: 5 security vendors CISOs need to be aware of

RSA roundup: 5 security vendors CISOs need to be aware of

Here are five companies that security professionals should consider in their quest to keep their organizations secure.

04/23/18

So far, so good for Symantec customers affected by Google distrust issue
Q&A

So far, so good for Symantec customers affected by Google distrust issue

DigiCert CEO John Merrill discusses the implications of Google's plan's to distrust Symantec certificates and what his company has done to help with the impending deadlines.

04/16/18

Microsegmentation evolves into a compensating control security tool

Microsegmentation evolves into a compensating control security tool

Illumio integrates Qualys data into its security platform to provide real-time vulnerability maps, enabling organizations to implement microsegmentation as a compensating control.

04/12/18

Palo Alto Networks buys Evident.io, extends its cloud security solution

Palo Alto Networks buys Evident.io, extends its cloud security solution

With the Evident Security Platform, Palo Alto Networks customers get a single dashboard to quickly find cloud security vulnerabilities and then see how to correct them.

03/15/18

Palo Alto Networks extends security to the big 3 public clouds

Palo Alto Networks extends security to the big 3 public clouds

Palo Alto Networks Next-Generation Security Platform expands security to all major public cloud services: Amazon Web Services, Google Cloud Platform and Microsoft Azure.

02/13/18

Apple, Cisco, Aon and Allianz partner in cyber risk management

Apple, Cisco, Aon and Allianz partner in cyber risk management

Cyber risk is real but hard to protect against. To help organizations, Apple, Cisco, Aon, and Allianz have partnered to create a joint solution.

02/12/18

How to speed up security tool evaluation and deployment

How to speed up security tool evaluation and deployment

Performing continual security tool evaluations and proofs of concept can be taxing on security teams. Security delivery platforms can greatly simplify the process.

02/05/18

Cisco ETA solves one of the biggest cybersecurity problems

Cisco ETA solves one of the biggest cybersecurity problems

Cisco Encrypted Traffic Analysis (ETA), now generally available, addresses one of the biggest pain points in the cybersecurity industry — finding malware in encrypted traffic.

01/10/18

Load More