CISA is warning that threat actors are actively exploiting a remote code execution vulnerability in F5's BIG-IP network products that can lead to data exfiltration and other security issues. Earlier, researchers and F5 had urged users to patch the flaw.
How do organizations protect themselves against lateral movement?
"The State of Security Segmentation" Report summarizes the results of a survey of over 300 IT professionals conducted by Virtual Intelligence Briefing (ViB) to understand how companies segment today and what difficulties they face.
Security teams are doing more with less while facing an increased attack surface as millions transition to a work-from-home model. For those tasked with protecting the network, it's time to rethink strategy.
As our new whitepaper makes clear, adopting Zero Trust is an effective first step toward agility and...
Your cloud journey is unique, but this new guide from Securosis shows there are common patterns and characteristics that point you in the right direction for a successful outcome.
Learn which cloud adoption pattern your organization aligns with, its key risks, critical recommendations and important questions to...
Palo Alto Networks product alert: All users should immediately patch a "critical" flaw in Pan-OS that can be remotely exploited to bypass authentication and take full control of systems or gain access to networks, U.S. Cyber Command and the Cybersecurity Infrastructure and Security Agency warn.
As applications move to the cloud, it no longer makes sense to backhaul all traffic over MPLS to centralised data centers. SD-WAN arrived to simplify branch IT, reduce MPLS costs, and deliver a great user experience. Put together, these advantages are driving organisations to rethink their network architectures and...
The recent shift towards cloud and mobility is due to the explosion of enterprise public cloud adoption. This has caused the traditional security perimeter that once protected users and internal services within the corporate network to largely disappear.
Read this guide to learn about:
Solving the IT skills...
Beyond mere information sharing, collective defense is a concept that aligns public and private sectors in a unified front against cyber threats. Bill Swearingen of IronNet Cybersecurity defines the concept and how it's being employed today.
Worries over ransomware and malware are slowing down enterprise IoT deployments, which is a reflection of the reputational and customer relationship risks at stake, according to a new survey. Here's what enterprises need to keep in mind when selecting security technology for IoT.
Hackers tried two methods of exploiting a zero-day vulnerability in Sophos' XG firewall, but Sophos says it made a temporary fix that mitigated the risks. Attackers originally attempted to plant a Trojan, but then switched to ransomware.
Internet usage around the world is shifting as a result of COVID-19. We are seeing an increase of 10-30% traffic across the board. As companies face a sudden surge in traffic, it is important that they ensure the availability of critical systems that serve their customers and employees.
Join Anand Guruprasad,...