Network Security

Understanding the Origins and Risks of Your Security Software Code
Testing & Security Understanding the Origins and Risks of Your Security Software Code

In today's rapidly evolving digital landscape, the security of software systems is paramount. With numerous contributors from various parts of the globe, the complexity of ensuring the integrity of security software has grown exponentially. The question that enterprises must ask themselves is: Who

Understanding the Origins of Your Security Software to Mitigate Risks
Testing & Security Understanding the Origins of Your Security Software to Mitigate Risks

Organizations today increasingly rely on security software to protect against cyber threats, but there's a critical aspect that often goes overlooked: understanding where and by whom this software is developed. This knowledge is vital for mitigating risks associated with malicious code insertions

Are Non-Encrypted Networks Leaving Systems Vulnerable to Cyber Attacks?
Testing & Security Are Non-Encrypted Networks Leaving Systems Vulnerable to Cyber Attacks?

In the ever-evolving landscape of cybersecurity, the case of StormBamboo provides a sobering reminder of the vulnerabilities inherent in non-encrypted network communications. This Chinese hacker group, also known as StormCloud or Evasive Panda, recently orchestrated a significant breach

Corelight Enhances AI-Powered Network Security with Major Funding Boost
Testing & Security Corelight Enhances AI-Powered Network Security with Major Funding Boost

Founded in 2013, Corelight is transforming the field of network detection and response (NDR) by leveraging artificial intelligence (AI) and machine learning (ML) to address prevalent security challenges. The recent $150 million Series E funding round, spearheaded by Accel and involving notable

Are SBOMs the Key to Unveiling Hidden Vulnerabilities in Network Equipment?
Testing & Security Are SBOMs the Key to Unveiling Hidden Vulnerabilities in Network Equipment?

Network equipment forms the backbone of enterprise communications, providing critical connectivity through essential devices such as routers, switches, firewalls, VPN gateways, and wireless access points. Despite their crucial role in maintaining consistent and secure communication channels, these

SolarWinds Patches Eight Critical Vulnerabilities to Safeguard Networks
Testing & Security SolarWinds Patches Eight Critical Vulnerabilities to Safeguard Networks

Recent actions by SolarWinds have highlighted the critical importance of addressing software vulnerabilities promptly and effectively. The company's Access Rights Manager (ARM) software, essential for managing and auditing access rights within enterprise IT infrastructures, was found to contain

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later