Latest from todayfeature7 key trends defining the cybersecurity market todayHere’s what CISOs should know about the industry’s evolutions, as top vendors fortify platform strategies, upstarts attract VC investment, and product categories blur and emerge.By Neal Weinberg04 Mar 20259 minsIntrusion Detection SoftwareSecurity Information and Event Management SoftwareVenture Capital feature What is zero trust? The security model for a distributed and risky eraBy Josh Fruhlinger28 Feb 202510 minsAccess ControlIdentity and Access ManagementZero Trustfeature What is SIEM? Improving security posture through event log dataBy David Strom20 Feb 202510 minsNetwork SecuritySecuritySecurity Information and Event Management Software newsHackers gain root access to Palo Alto firewalls through chained bugsBy Shweta Sharma 19 Feb 20253 minsNetwork SecuritySecurityVulnerabilities newsPalo Alto Networks firewall bug being exploited by threat actors: ReportBy Howard Solomon 14 Feb 20251 minNetwork SecurityVulnerabilitiesZero-Day Vulnerabilities newsSpy vs spy: Security agencies help secure the network edgeBy Lynn Greiner 06 Feb 20251 minNetwork SecuritySecurity opinionThe cloud is not your only option: on-prem security still alive and well in Windows Server 2025By Susan Bradley 06 Feb 20257 minsCloud SecurityData and Information SecurityWindows Security how-toDownload our extended detection and response (XDR) buyer’s guideBy Tim Ferrill 05 Feb 20251 minIntrusion Detection SoftwareNetwork SecuritySecurity Information and Event Management Software newsNew trojan hijacks Linux and IoT devicesBy Taryn Plumb 04 Feb 20254 minsCyberattacksNetwork Security Articleshow-toDownload our security information and event management (SIEM) tools buyer’s guideSecurity information and event management (SIEM) is a blue-collar tool for network security professionals. Although not glamorous, it’s one of the more important aspect of building a secure enterprise network.By Tim Ferrill 29 Jan 2025 1 minData and Information SecurityNetwork SecuritySecurity Information and Event Management SoftwarenewsUnknown threat actor targeting Juniper routers with backdoor: ReportAdmins are urged to scan for possible compromise.By Howard Solomon 28 Jan 2025 1 minMalwareNetwork Securitynews analysisPalo Alto Networks firewalls have UEFI flaws, Secure Boot bypassesSecurity researchers have uncovered known firmware flaws in three Palo Alto enterprise firewall devices built on commodity hardware.By Lucian Constantin 23 Jan 2025 7 minsNetwork SecurityTechnology IndustryVulnerabilitiesfeatureRidding your network of NTLMThe path to eradicating this ancient protocol and security sinkhole won’t be easy, but the time has come for its complete eradication.By David Strom 20 Jan 2025 9 minsAuthenticationNetwork SecurityWindows SecurityfeatureSIEM buyer’s guide: Top 15 security information and event management tools — and how to chooseSecurity information and event management tools are a core part of most companies’ cyber defenses. This guide will help you find SIEM options that best match your needs.By Tim Ferrill 16 Jan 2025 20 minsEnterprise Buyer’s GuidesNetwork SecuritySecuritynewsFortinet confirms zero-day flaw used in attacks against its firewallsThe advisory from the cybersecurity company follows a report from security researchers who observed exploits in the wild in early December as part of a widespread campaign.By Lucian Constantin 14 Jan 2025 5 minsNetwork SecurityTechnology IndustryZero-Day VulnerabilitiesnewsSonicWall firewall hit with critical authentication bypass vulnerability The company urged admins to immediately patch their firewalls to fend off threats of easy exploitation.By Shweta Sharma 09 Jan 2025 3 minsNetwork SecurityVulnerabilitiesnewsIvanti warns critical RCE flaw in Connect Secure exploited as zero-dayThe software maker announced that a stack-based buffer overflow flaw in its SSL VPN appliance has been exploited in the wild. Ivanti Policy Secure and Ivanti Neurons for ZTA gateways are also impacted.By Lucian Constantin 08 Jan 2025 4 minsNetwork SecurityThreat and Vulnerability ManagementZero-Day Vulnerabilitieshow-toDownload our security orchestration, automation, and remediation (SOAR) tools buyer’s guideSecurity orchestration, automation, and response (SOAR) has undergone a major transformation in the past few years. Still, the need for better automation and leveraging AI is still very much needed to defend the enterprise stack.By David Strom 02 Jan 2025 1 minData and Information SecurityEnterprise Buyer’s GuidesNetwork SecuritynewsNetwork problems delay flights at two oneworld Alliance airlinesAmerican Airlines flights were grounded for up to an hour on Dec. 24, while 71 JAL flights were delayed and four cancelled on Dec. 26.By Peter Sayer 26 Dec 2024 1 minDDoSNetwork SecurityTransportation and Logistics IndustrynewsUS eyes ban on TP-Link routers amid cybersecurity concernsExperts warn that hacked devices can serve as entry points for corporate espionage, DDoS attacks on enterprise systems, and the interception of sensitive information over VPNs.By Gyana Swain 19 Dec 2024 5 minsNetwork SecuritySecurityVulnerabilitieshow-toDownload our breach and attack simulation (BAS) buyer’s guideBreach and attack simulation (BAS) products help organizations understand their security posture by automating the tests of specific threat vectors. You can think of BAS as like going around to check whether all the locks on your doors work.By Maria Korolov 18 Dec 2024 1 minCyberattacksData BreachPenetration Testing Show more Show less View all Resources whitepaper Real-Time, All the Time: Fuelling AI success through a continuous data stream With AI dominating conversations everywhere, practitioners and executives are seeking answers: How to succeed with GenAI? Delivering on AI initiatives requires the right strategy, platform and data stack. The post Real-Time, All the Time: Fuelling AI success through a continuous data stream appeared first on Whitepaper Repository –. By StreamSets 26 Aug 2024Artificial IntelligenceData and Information SecurityData Management View all Video on demand videoGet up to speed on SASE: What’s driving demand and how providers’ capabilities differAs enterprises build up their mobile, edge and cloud deployments, they’re being challenged to deliver a more efficient, scalable network-security architecture. Secure access service edge (SASE) is the convergence of security and networking in a cloud-delivered model. Learn what’s driving demand for SASE, how SASE providers’ capabilities differ, and the skills companies need to get started. 15 Oct 2021 26 minsNetwork SecuritySASESecurity WAN evolution: From SD-WAN to Secure Access Service Edge (SASE) 25 Jun 2021 31 minsNetwork SecuritySASESD-WAN How have network firewalls evolved? 30 Apr 2018 FirewallsNetwork MonitoringNetwork Security Is it time to kill the pen test? | Salted Hash Ep 22 18 Apr 2018 12 minsCybercrimeHackingNetwork MonitoringSee all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Physical Security Privacy Risk Management View all topics Show me morePopularArticlesPodcastsVideos news Linux, macOS users infected with malware posing as legitimate Go packages By Shweta Sharma 07 Mar 20253 mins MalwareSecurity feature 8 obstacles women still face when seeking a leadership role in IT By Christina Wood 07 Mar 20258 mins CareersIT Leadership feature What is risk management? Quantifying and mitigating uncertainty By Josh Fruhlinger 07 Mar 202510 mins IT Governance FrameworksIT LeadershipRisk Management podcast CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security video CSO Executive Sessions: How should software solution providers keep themselves and their enterprise clients safe? 26 Jan 202518 mins Security video CSO Executive Sessions: Open Source Institute’s Eric Nguyen on supply chain risks to critical infrastructure (Part 2) 14 Nov 202415 mins Critical InfrastructureIT GovernanceSupply Chain