Top

Category: Security


Monitoring, Monitoring&Analysis, Security

Verizon Buys Software Defined Perimeter Assets from Vidder

November 20, 2018

Via: The Fast Mode

Verizon acquired the PrecisionAccess solution and other Software Defined Perimeter (SDP) related assets from privately held Vidder, a company offering trusted and unified access control. Terms of the transaction were not announced. Vidder’s advanced technology is already integrated into Verizon’s […]


Monitoring&Analysis, Security

9 cyber security predictions for 2019

November 20, 2018

Via: CSO

Predictions are tough, but even moreso in the chaotic world of cyber security. The threat landscape is huge, offensive and defensive technologies are evolving rapidly, and nation-state attacks are increasing in terms of scope and sophistication. This cyber “fog of […]


Monitoring&Analysis, Security

Russian Cozy Bear APT 29 hackers may be impersonating State Department

November 19, 2018

Via: CSO

Cozy Bear, or APT29, the Russian state-sponsored cyber-espionage group, appears to be active again, and it is thought to be impersonating the United States State Department in a large spear-phishing campaign. Neither CrowdStrike nor FireEye has directly blamed Cozy Bear, […]


Monitoring&Analysis, Security

Agentless threat detection for Microsoft Azure workloads with Cisco Stealthwatch Cloud

November 16, 2018

Via: Cisco Blog

Detecting threats, such as malware, rogue insiders, and credential abuse, within public cloud environments can be a major challenge. Traditionally, organizations have tried to solve this problem by overlaying a patchwork of agents across the cloud surface to detect bad […]


Monitoring&Analysis, Security

Securing the IoT has become business-critical

November 16, 2018

Via: Networkworld Security

The IoT era has arrived. Here’s some proof: 83% of organizations say the Internet of Things (IoT) is important to business today, and 92% say it will be in two years. That’s according to a recent DigiCert survey conducted by […]


Monitoring&Analysis, Security

Best-of-breed security products still dominate — kind of

November 16, 2018

Via: CSO

The history of security purchasing centers around best-of-breed products. With each requirement, security professionals would research products, review third-party tests, bring in products for internal testing, and buy those that exhibited a superior ability to prevent, detect, or respond to […]


Monitoring&Analysis, Security

What is the cyber kill chain? Why it’s not always the right approach to cyber attacks

November 15, 2018

Via: CSO

As an infosec professional, you’ve likely heard about using a cyber kill chain, also known as a cyber attack lifecycle, to help identify and prevent intrusions. Attackers are evolving their methods, which might require that you look at the cyber […]


Monitoring&Analysis, Security

Addressing privacy and security concerns in 5G networks

November 14, 2018

Via: RCR Wireless News

WASHINGTON, D.C.–Amid high anticipation for 5G capabilities and applications, the question of who is — or ought to be — responsible for ensuring security and privacy on those new networks is one that remains to be answered. Does the federal […]


Monitoring&Analysis, Security

The end of security as we know it

November 14, 2018

Via: CSO

If you listen very carefully, the age of information security as we know it ended recently, not with a bang, but with a whimper. While that may be something of an overstatement, a recent event put us on the track […]


Monitoring&Analysis, Security, Wireless

Cisco Intent-Based Networking Everywhere

November 13, 2018

Via: Cisco Blog

The next step in intent-based networking is putting it in more places. We launched our intent-based networking portfolio a year ago with the introduction of the Catalyst 9000 line of switches and DNA Center. These products support a new way […]