Federal authorities and medical device maker Philips have issued security alerts about security vulnerabilities in some of the company's patient monitoring software. Until patches are available, the company is recommending risk mitigation steps.
The security firm Positive Technologies discovered six vulnerabilities in Palo Alto Networks' PAN-OS, the software that runs the company's next-generation firewalls. The firewall developer has issued patches.
Radware's Alteon SSL Inspect provides a simple one-box solution for high-performance visibility
into enterprise SSL/TLS traffic. It removes the blind spot introduced by the rising use of SSL/TLS
and allows security tools to inspect all traffic for possible breaches and leaks.
Download this data sheet to lean more...
The need for enhanced business agility and secure remote access to support digital transformation has led to the adoption of the security access service edge, or SASE, model, says Rajpreet Kaur, senior principal analyst at Gartner.
This session is dedicated to our UK, EU and ME audiences and will provide practical steps to enable organisations to successfully implement a strategy of least privilege. Least privilege will allow you to eliminate unnecessary risk by elevating rights across multi platforms and networked devices without hindering...
Detection and response is a critical piece in an ongoing journey to improve your security posture. As the threat landscape grows increasingly complex, an effective detection and response program will help you recognize threats early and minimize the likelihood of attacker success. For many SIEM vendors, solving these...
Implementing an adaptive, risk-based authentication process for remote system access is proving effective as more staff members work from home during the COVID-19 pandemic, says Ant Allan, a vice president and analyst at Gartner.
The emerging cloud-delivered service model known as security access service edge, or SASE, is designed to help simplify security for remote access, says Sean Duca of Palo Alto Networks, who explains how the model works.
CISA is warning that threat actors are actively exploiting a remote code execution vulnerability in F5's BIG-IP network products that can lead to data exfiltration and other security issues. Earlier, researchers and F5 had urged users to patch the flaw.
Today's IT teams face a common challenge: how to securely enable the growing universe of roaming users, devices, and software-as-a-service (SaaS) apps without adding complexity or reducing end-user performance - all while leveraging their existing security investments. Likewise, users in remote and branch offices need...
How do organizations protect themselves against lateral movement?
"The State of Security Segmentation" Report summarizes the results of a survey of over 300 IT professionals conducted by Virtual Intelligence Briefing (ViB) to understand how companies segment today and what difficulties they face.
Security teams are doing more with less while facing an increased attack surface as millions transition to a work-from-home model. For those tasked with protecting the network, it's time to rethink strategy.
As our new whitepaper makes clear, adopting Zero Trust is an effective first step toward agility and...
Your cloud journey is unique, but this new guide from Securosis shows there are common patterns and characteristics that point you in the right direction for a successful outcome.
Learn which cloud adoption pattern your organization aligns with, its key risks, critical recommendations and important questions to...