End-to-end network segmentation essential for security, yet few deploy
As point-of-sale breaches, ransomware attacks and various other customer data breaches continue to make local and national headlines, IT professionals agree that network …
Flaws in Network Management Systems open enterprise networks to attacks
For quite a while now, Rapid7 researchers Tod Beardsley and Deral Heiland have been looking for vulnerabilities in various Network Management Systems (NMSs). With the help of …
Cisco, Fortinet validate exploits leaked by the Shadow Brokers
Cisco and Fortinet have released security advisories confirming that some of the exploits leaked by the Shadow Brokers work as intended. The entity released the batch as proof …
New home router OS tackles firmware shortcomings
Untangle announced the release of a new operating system for consumer Wi-Fi routers at DEF CON 24. Router hardware has evolved and improved over the years, but its firmware …
Netherlands, South Korea get nationwide IoT network
In the space of a week, the Netherlands and South Korea got their own, nationwide IoT network. Late last week, Dutch telecom KPN announced that its LoRa (Long Range) network …
Rethink network security outside the box
Preventing bad guys from compromising an organization has historically been executed based on a basic concept: establish a perimeter, and control who and what goes in and out. …
Flaws in Ubee router can facilitate attacks on connected networks
Researchers have discovered five critical vulnerabilities in Ubee EVW3226, a VoIP cable modem router used by operators across Europe, which can be exploited to compromise the …
Has your network been compromised? Use RITA to find out
Have you heard about RITA? Real Intelligence Threat Analysis is a an open source tool – a framework, actually – aimed at helping organizations find malicious …
Will 2016 be the year of the 100G network?
100G Ethernet networks will be deployed much faster and more broadly than previously expected. Based on the influence of new paradigms currently emerging like SDN, NFV, Big …
Featured news
Resources
Don't miss
- Building a robust security posture with limited resources
- Mitel MiCollab zero-day and PoC exploit unveiled
- 8 US telcos compromised, FBI advises Americans to use encrypted communications
- Download: The Ultimate Guide to the CCSP
- Preparing for Q-day: The essential role of cloud migration in securing enterprise data