informa

Perimeter

Network Perimeter Security - News & Commentary

Omdia Webinar: How to Survive the Encrypted Network Traffic Apocalypse
Omdia Principal Analyst Eric Parizo discusses the changing network traffic decryption landscape amid encryption standards changes, and presents ways to maintain critical network traffic visibility.
January 12, 2022
Omdia Principal Analyst Eric Parizo discusses the changing network traffic decryption landscape amid encryption standards changes, and presents ways to maintain critical network traffic visibility.
by Eric Parizo, Principal Analyst, Omdia
January 12, 2022
1 min read
Article
Lights Out: Cyberattacks Shut Down Building Automation Systems
Security experts in Germany discover similar attacks that lock building engineering management firms out of the BASes they built and manage — by turning a security feature against them.
December 20, 2021
Security experts in Germany discover similar attacks that lock building engineering management firms out of the BASes they built and manage — by turning a security feature against them.
by Kelly Jackson Higgins, Executive Editor
December 20, 2021
9 min read
Article
CISA Issues Emergency Directive on Log4j
The Cybersecurity Infrastructure and Security Agency orders federal agencies to take actions to mitigate vulnerabilities to the Apache Log4j flaw and attacks exploiting it.
December 17, 2021
The Cybersecurity Infrastructure and Security Agency orders federal agencies to take actions to mitigate vulnerabilities to the Apache Log4j flaw and attacks exploiting it.
by Dark Reading Staff, Dark Reading
December 17, 2021
1 min read
Article
Analysis: Log4j Vulnerability Highlights the Value of Defense-in-Depth, Accurate Inventory
The early lessons from Log4j indicate that key security principles can help better handle these high-risk software supply chain security incidents if teams have proper support.
December 15, 2021
The early lessons from Log4j indicate that key security principles can help better handle these high-risk software supply chain security incidents if teams have proper support.
by Fernando Montenegro, Senior Principal Analyst
December 15, 2021
6 min read
Article
NIST Cyber-Resiliency Framework Extended to Include Critical Infrastructure Controls
The latest NIST publication outlines how organizations can build systems that can anticipate, withstand, recover from, and adapt to cyberattacks.
December 10, 2021
The latest NIST publication outlines how organizations can build systems that can anticipate, withstand, recover from, and adapt to cyberattacks.
by Edge Editors, Dark Reading
December 10, 2021
2 min read
Article
Broadcom Inc. Announces $10 Billion Share Repurchase Authorization
The authorization is effective until December 31, 2022.
December 09, 2021
The authorization is effective until December 31, 2022.
December 09, 2021
3 min read
Article
Lack of Patching Leaves 300,000 Routers at Risk for Attack
A significant percentage of the 2 million consumer and small-business routers produced by a Latvian firm are vulnerable and being used by attackers, a security firm says.
December 09, 2021
A significant percentage of the 2 million consumer and small-business routers produced by a Latvian firm are vulnerable and being used by attackers, a security firm says.
by Robert Lemos, Contributing Writer
December 09, 2021
5 min read
Article
Top 5 Reasons to Get 'SASE' With Security
Proactively updating and integrating technology, and ensuring tight collaboration between IT and security … it's simple, right? Well, not always – especially for organizations with limited resources.
December 02, 2021
Proactively updating and integrating technology, and ensuring tight collaboration between IT and security … it's simple, right? Well, not always – especially for organizations with limited resources.
by Angela Frechette, Security Business Group, Cisco
December 02, 2021
4 min read
Article
Key Characteristics of Malicious Domains: Report
Newer top-level domains and certain hosting providers are frequent sources of malicious content, while newly registered domains and free SSL certificates are not any more likely than average to be risky, new research shows.
December 02, 2021
Newer top-level domains and certain hosting providers are frequent sources of malicious content, while newly registered domains and free SSL certificates are not any more likely than average to be risky, new research shows.
by Robert Lemos, Contributing Writer
December 02, 2021
5 min read
Article
When Will a Cloud Infrastructure Heavyweight Launch a SASE?
There's been a veritable gold rush of security vendors getting into secure access service edge. Now will any of the major IaaS vendors enter the market? Rik Turner makes the case.
December 02, 2021
There's been a veritable gold rush of security vendors getting into secure access service edge. Now will any of the major IaaS vendors enter the market? Rik Turner makes the case.
by Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia
December 02, 2021
5 min read
Article
What’s the Difference Between SASE and SD-WAN?
While SD-WAN is a key part of a hybrid workplace and multicloud operation, it should be treated as a stepping stone to SASE, not an alternative.
November 30, 2021
While SD-WAN is a key part of a hybrid workplace and multicloud operation, it should be treated as a stepping stone to SASE, not an alternative.
by Shaila Shankar, SVP and General Manager, Cisco Cloud Network and Security
November 30, 2021
2 min read
Article
Armis Now Valued at $3.4B
One Equity Partners led the $300 million round, increasing the valuation of Armis from the $2 billion valuation it achieved less than 8 months ago.
November 29, 2021
One Equity Partners led the $300 million round, increasing the valuation of Armis from the $2 billion valuation it achieved less than 8 months ago.
November 29, 2021
5 min read
Article
How Threat Actors Get Into OT Systems
The convergence and integration of OT and IT has resulted in a growing number of cyber-risks for critical infrastructure. Here are some of the ways attackers are targeting operational technology systems.
November 24, 2021
The convergence and integration of OT and IT has resulted in a growing number of cyber-risks for critical infrastructure. Here are some of the ways attackers are targeting operational technology systems.
by Donovan Tindill, senior cybersecurity strategist, Honeywell
November 24, 2021
5 min read
Article
Why Should I Adopt a Zero-Trust Security Strategy?
Zero-trust is the right approach for protecting your end users. Executing it in the right way will also help you comply with NIST standards and upcoming federal mandates.
November 23, 2021
Zero-trust is the right approach for protecting your end users. Executing it in the right way will also help you comply with NIST standards and upcoming federal mandates.
by Ash Devata, General Manager, Cisco Zero Trust and Duo Security
November 23, 2021
2 min read
Article
Pentagon Partners With GreyNoise to Investigate Internet Scans
With a new five-year, $30 million contract, GreyNoise Intelligence will assist multiple teams across the Department of Defense in a defensive capacity.
November 23, 2021
With a new five-year, $30 million contract, GreyNoise Intelligence will assist multiple teams across the Department of Defense in a defensive capacity.
by Fahmida Y. Rashid, Features Editor, Dark Reading
November 23, 2021
4 min read
Article