News
Network Access Control technologies
- June 19, 2019
19 Jun'19
Fortinet launches new WAN and edge security platform
Fortinet's Secure SD-Branch platform uses Fortinet security products to converge WAN and security into an integrated platform and protect access edges.
- March 22, 2017
22 Mar'17
HTTPS interception, middlebox models under fire
HTTPS interception in security products and services may be reducing security rather than improving it, according to US-CERT, which puts middleboxes in a precarious position.
- February 01, 2017
01 Feb'17
Tatu Ylonen explains the risks of IoT SSH implementations
SSH creator Tatu Ylonen explains why IoT SSH implementations can be dangerous and presents real-world examples of threat actors abusing SSH keys to attack enterprises.
-
- January 27, 2017
27 Jan'17
How improper SSH key management is putting enterprises at risk
In part two of his interview with SearchSecurity, SSH creator Tatu Ylonen explains why proper SSH key management is crucial and how attackers can use lost or exposed keys.
- August 31, 2016
31 Aug'16
Windows 10 Anniversary update adds headaches for antivirus vendors
The antivirus industry has been under fire lately, and Microsoft's Windows 10 Anniversary update has added new troubles for antivirus software vendors.
- July 28, 2016
28 Jul'16
Dell: Signature-based detection must give way to machine learning
Dell's Brett Hansen discusses his company's new approach to advanced threat protection, which leaves behind signature-based detection and embraces machine learning.
- June 17, 2016
17 Jun'16
What Symantec's acquisition of Blue Coat says about the CASB market
Symantec's $4.65 billion acquisition of Blue Coat Systems could lead to a dramatic shift at the antivirus vendor, but what does the deal mean for the cloud access security broker space?
- April 01, 2016
01 Apr'16
What endpoint protection software is on your short list?
Roughly half of survey respondents indicated that their organization is shifting away from static scanning as the primary protection for endpoints.
- January 05, 2015
05 Jan'15
Evolving mobile security management thwarts unified endpoint management
Experts say unified endpoint management for mobile devices, laptops and desktops will take more time due to the complex, evolving demands of mobile security management.
- November 10, 2014
10 Nov'14
Network security assessment should play part in M&A process
Mergers and acquisitions present opportunities for attackers interested in valuable data, but experts say most enterprises fail to perform a network security assessment before proceeding with a deal.
-
- September 17, 2014
17 Sep'14
Research finds holes in defense-in-depth security model
The defense-in-depth security model is often touted as a must for enterprises, but research shows that security products often fail to do what they're supposed to.
- October 13, 2011
13 Oct'11
IT security pros acknowledge network security weaknesses, configuration issues
Improperly configured network devices and the inability to measure the network security posture make most IT organizations incapable of finding gaps in their systems, according to a new survey.
- February 17, 2011
17 Feb'11
Trend Micro announcements aimed at data security protection
Trend Micro made a series of announcements including new products for preventing data loss at the endpoint, endpoint encryption, an email scanner and a data protection service.
- February 15, 2011
15 Feb'11
Software fraud, phony electronic parts pose serious security risks, expert says
Hardware and software fraud pose serious threats according to a supply chain expert who says the lack of security is flooding the market for fraudulent devices and parts.
- July 29, 2010
29 Jul'10
Black Hat: Poor SCADA systems security 'like a ticking time bomb'
An analysis of 120 security assessments at power plants, oil and chemical refineries and other critical systems revealed tens of thousands of security vulnerabilities, outdated operating systems and unauthorized applications.