Your business networks generate a ton of data every day. That data can be analyzed to provide insights into how your network is operating or to find security threats. Network traffic analysis (NTA) solutions allow network administrators to collect data on the traffic that flows through a network. These tools are typically used for identifying performance problems and/or for discovering security problems. An NTA solution is no doubt useful, but it can be difficult to determine the best network traffic analysis solutions for your enterprise.
A privilege escalation vulnerability discovered in Forcepoint VPN Client for Windowsdiscovered by Security Researcher Peleg Hadar of SafeBreach Labs can be used by attackers to evade detection and achieve persistence.
With cloud misconfigurations rampant in cloud storage and IaaS environments, adding security layers to identify them is crucial for securing sensitive data.
A phishing campaign targeting utility grid operators uses a PDF attachment to deliver spyware.
Solutions Review have compiled a list of the best 32 network monitoring tools. These solutions include both software and hardware that help IT teams monitor and manage their network performance. We’ve listed the major features of each solution and the approach they bring to network performance monitoring and management. These tools should definitely be considered by any enterprise looking for a solution to improve or manage the performance of their network infrastructure.
Earlier this week, Capital One became the latest financial institution to fall victim to a data breach as it was discovered that a hacker illicitly gained access to data on 100 million customers. The data reportedly consisted of consumer and small business credit card applications filed between 2005 and 2019 and included applicants’ names, addresses, phone numbers, dates of birth, and other sensitive information. About 140,000 Social Security numbers and 80,000 bank account numbers were also accessed, although the bank said no credit card numbers or log-in credentials were compromised.
At least 62 colleges were affected by a software vulnerability in a program called Banner, operated by Ellucian, that allows threat actors to infiltrate colleges’ private records.
The incidents of Mirai malware with 60 known variants targeting the enterprise through IoT devices, has more than doubled between the first quarter of 2018 through the first quarter of 2019 according to IBM X-Force researchers.
D-Link agreed to make several security enhancements that overhaul the firm’s security platform to settle a Federal Trade Commission (FTC) litigation case concerning allegations that the company misrepresented the security of its products.
The number of breaches impacting corporate networks has reached epidemic proportions. This year is currently on track to break all records for breaches. Already this year there have been 1,900 reported breaches in just the past three months, according to Risk Based Security.