news analysisNew server backdoors posing as security product target telecomsThe backdoors masquerade as components of Palo Alto Networks' Cortex XDR.By Lucian ConstantinSep 19, 20234 minsAdvanced Persistent ThreatsTelecommunications IndustryNetwork Security news Perception Point launches MSP program to help partners tackle threatsBy Michael HillSep 13, 20232 minsManaged Service ProvidersThreat and Vulnerability ManagementNetwork Securitynews New research reveals most-attacked, most-vulnerable assetsBy Michael HillSep 05, 20234 minsCritical InfrastructureNetwork SecurityVulnerabilities news analysisRecently patched Juniper firewall flaws allow remote code executionBy Lucian Constantin Aug 29, 20236 minsRemote Access SecurityNetwork SecurityVulnerabilities newsProxyjacking campaign LABRAT targets vulnerable GitLab deploymentsBy Lucian Constantin Aug 17, 20235 minsHackingGitLabNetwork Security newsCheck Point beefs up SASE offering with $490M Perimeter 81 acquisitionBy Jon Gold Aug 10, 20233 minsZero TrustMergers and AcquisitionsNetwork Security news analysisIBM launches open-source detection and response framework for MFT attacksBy Lucian Constantin Aug 09, 20235 minsCyberattacksNetwork SecurityVulnerabilities news analysisAttackers use Cloudflare Tunnel to proxy into victim networksBy Lucian Constantin Aug 08, 20236 minsCyberattacksCloud SecurityNetwork Security newsKubernetes clusters under attack in hundreds of organizationsBy Michael Hill Aug 08, 20235 minsCloud SecurityNetwork SecurityOpen Source Articlesnews analysisVPN gateways, security appliances, and NAS boxes enter the top 20 riskiest enterprise devicesMost of the vulnerabilities tracked affect computers and servers, but IoT and OT devices have a higher percentage of critical vulnerabilities.By Lucian Constantin Jul 14, 2023 7 minsNetwork SecurityVulnerabilitiesbrandpostSponsored by CiscoCisco’s platform strategy: a simple, secure, single pane of glass Cisco’s Networking Cloud and Security Cloud offer powerful capabilities while reducing complexity. By Cisco Jul 12, 2023 9 minsNetwork SecuritynewsCisco warns of unpatched exploit in a family of data center switchesCisco’s Nexus 9000 series switches in ACI mode have a flaw that can allow attackers to read and modify encrypted traffic. By Shweta Sharma Jul 07, 2023 2 minsNetwork SecurityVulnerabilitiesfeatureLiving-off-the-land attacks are hard, but not impossible, to protect againstIt’s not easy to detect and defend against attackers who can lurk in Windows systems, mimicking functions native to the operating system, but there are practical measures that will help thwart them.By Susan Bradley Jun 28, 2023 6 minsSoftware ProvidersWindows SecurityNetwork Securitynews analysisCritical flaw in VMware Aria Operations for Networks sees mass exploitation attemptsAkamai reports nearly 700,000 attacks with 27,000 of its customers being scanned for the vulnerability.By Lucian Constantin Jun 26, 2023 3 minsCyberattacksNetwork SecurityVulnerabilitiesfeatureHybrid Microsoft network/cloud legacy settings may impact your future security postureSwitching from legacy Active Directory systems to the cloud can improve versatility but hybrid systems need special attention to ensure they’re still secure.By Susan Bradley Jun 22, 2023 7 minsActive DirectoryWindows SecurityCloud SecuritynewsTrellix, Netskope announce new Amazon Security Lake support to enhance threat detection, remediationTrellix expands XDR support for Amazon Security Lake while Netskope integrates its SSE platform with AWS’ centralized security data service.By Michael Hill May 31, 2023 3 minsIntrusion Detection SoftwareCloud SecurityNetwork SecuritynewsAxiado releases new security processors for servers and network appliancesThe new TCUs released by Axiado are built within a single SoC, with AI as added layer of security.By Shweta Sharma May 23, 2023 4 minsCloud SecurityNetwork Securitynews analysisCritical remote code execution flaws patched in Cisco small business switchesSome of the vulnerabilities could lead to complete compromise of the device as a proof of concept is publicly available.By Lucian Constantin May 18, 2023 3 minsNetwork SecurityVulnerabilitiesnewsAviatrix is transforming cloud network security with distributed firewallingThe new distributed cloud firewall offering distributes both inspection and policy enforcement into the original path of application traffic, eliminating the need to redirect traffic to centralized firewalls.By Shweta Sharma May 18, 2023 4 minsFirewallsCloud SecurityNetwork Securitynews analysisResearchers show ways to abuse Microsoft Teams accounts for lateral movementAttackers have several ways to enable lateral movement within a network via a compromised Teams account.By Lucian Constantin May 17, 2023 5 minsMicrosoftData and Information SecurityNetwork Securityfeature7 VPN alternatives for securing remote network accessVirtual private networks have shortcomings when it comes to protecting remote network connections. These technologies can replace or supplement it.By Michael Hill May 09, 2023 13 minsRemote Access SecurityNetwork Security Show more Show less View all Resources whitepaper ESG Report: The Long Road Ahead to Ransomware Preparedness In the latest eBook from ESG, you'll learn research-backed methods to: ? Mitigate and respond to evolving ransomware threats ? Recover your data--without paying the ransom ? Ensure business continuity, and plan RPO and RTO for the fastest recovery The post ESG Report: The Long Road Ahead to Ransomware Preparedness appeared first on Whitepaper Repository. By Cohesity 18 Sep 2023Browser SecurityNetwork SecuritySecurity whitepaper ESG Report: The Long Road Ahead to Ransomware Preparedness By Cohesity 18 Sep 2023Browser SecurityNetwork SecuritySecurity whitepaper Connect and Communicate Network Ecosystem By Red Hat & ConRes 14 Aug 2023Business OperationsCloud NativeNetwork Security View all Podcasts podcastsSecure Remote Working: what we've learnt and where we go from hereSecure Remote Working is a podcast series looking at how organizations have had to adapt during the COVID19 pandemic; the challenges they faced, the solutions they found, and the long-term impact of secure remote working at scale. This series outlines how the threat landscape changed, the cultural and leadership impacts, and the key technologies that have enabled organizations to continue to operate in difficult circumstances.3 episodesRemote Access Security Ep. 01 Episode 1: Preparing for the next phase in secure remote working Aug 10, 202032 mins Security Ep. 03 Episode 3: Guiding CISOs through change planning for the new way of working Aug 10, 202026 mins Security Video on demand videoWhat is zero trust security?Beyond firewalls and perimeter security, a zero trust architecture allows security officials to better protect data and system access to both outsider and insider threats, adopting a mantra of “trust no one”. We explain the concept in this video. Sep 06, 2023 3 minsAuthenticationZero TrustNetwork Security Get up to speed on SASE: What's driving demand and how providers' capabilities differ Oct 15, 2021 26 minsSASENetwork SecuritySecurity WAN evolution: From SD-WAN to Secure Access Service Edge (SASE) Jun 25, 2021 31 minsSASESD-WANNetwork Security How have network firewalls evolved? Apr 30, 2018 FirewallsNetwork MonitoringNetwork Security See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Physical Security Privacy Risk Management Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news analysis DHS unveils one common platform for reporting cyber incidents By Cynthia Brumfield Sep 25, 202310 mins RegulationRegulationRegulation news Chinese state actors behind espionage attacks on Southeast Asian government By Shweta Sharma Sep 25, 20234 mins Advanced Persistent ThreatsCyberattacks feature How to pick the best endpoint detection and response solution By Linda Rosencrance Sep 25, 202310 mins Intrusion Detection SoftwareSecurity Monitoring SoftwareData and Information Security podcast CSO Executive Sessions Australia with Nicole Neil, Director of Information Security at Seer Medical Sep 20, 202312 mins CSO and CISO podcast CSO Executive Sessions Australia with Siddiqua Shaheen, Head of Cyber Governance at Lander & Rogers Sep 07, 202317 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: IHH Healthcare's Francis Yeow on defining the CISO role Sep 06, 202310 mins CSO and CISO video CSO Executive Sessions Australia with Nicole Neil, Director of Information Security at Seer Medical Sep 20, 202312 mins CSO and CISO video CSO Executive Sessions / ASEAN: IHH Healthcare's Francis Yeow on defining the CISO role Sep 06, 202310 mins CSO and CISO video What is inside a hacker's backpack? Sep 06, 202333 mins HackingCybercrime