Topic: network visibility
-
Corelight's AWS Flow Monitoring Ends Cloud Blind Spots
Corelight's new Flow Monitoring solution for AWS provides unified network visibility across cloud and hybrid infrastructures, reducing SIEM and storage costs by up to 90% compared to traditional methods. The solution converts high-volume AWS flow data into enriched, security-focused intelligence,...
Read More » -
NETSCOUT Boosts Kubernetes Visibility with Continuous Observability
NETSCOUT has launched the Omnis KlearSight Sensor for Kubernetes to provide deep, real-time insights into performance, health, and costs in complex multi-cluster environments. The solution captures decrypted packets directly from the Linux kernel using eBPF technology, enabling visibility into en...
Read More » -
Flowmon ADS 12.5: Effortless Threat Detection Made Simple
Progress Software has launched Flowmon ADS 12.5, an AI-powered anomaly detection system designed to simplify threat identification and provide enhanced network visibility for organizations. The solution addresses challenges like alert fatigue and resource constraints, especially for midsize busin...
Read More » -
AI Cyberattacks Are Rising: Is Your Network Ready?
Adversarial AI tools are enabling faster, more sophisticated, and evasive cyberattacks that can bypass traditional defenses and overwhelm manual security processes. This threat evolution necessitates a zero-trust security framework and makes comprehensive network visibility through Network Detect...
Read More » -
Top 6 Cyber Threats to Watch in 2026
The cybersecurity landscape is defined by a dangerous synergy between AI and human ingenuity, creating adaptive, automated threats that require a proactive, intelligence-driven security posture beyond traditional defenses. Key emerging threats include autonomous agentic AI exploits, weaponized de...
Read More » -
Stop Malicious PowerShell with New ExtraHop Security Tools
ExtraHop has introduced new security enhancements to detect and neutralize malicious PowerShell activity, which attackers use to operate stealthily within networks by blending in with normal administrative tasks. The platform integrates detection mechanisms that identify specific malicious behavi...
Read More » -
Rethink Network Visibility for Australia's Critical Infrastructure
Government agencies in Australia and the Asia Pacific face escalating cybersecurity threats due to the deep integration of digital and physical infrastructure, making public services like transportation and healthcare prime targets for sophisticated attacks. The convergence of IT and OT systems, ...
Read More » -
NETSCOUT Enhances Cloud Compliance for Enterprises
NETSCOUT has enhanced its Omnis KlearSight Sensor for Kubernetes to provide deeper visibility for compliance, accelerating threat detection and validating zero-trust policies in response to widespread Kubernetes adoption. The platform addresses compliance risks by capturing packet- and process-le...
Read More » -
OPNsense 26.1: Major Updates for Open-Source Firewall
OPNsense 26.1, "Witty Woodpecker," introduces major enhancements to firewall management, including a redesigned rules interface and expanded API coverage for deeper automation and programmability. The update adds new threat intelligence and asset visibility features, such as optional Q-Feeds for ...
Read More » -
Australia excels at detecting cyberattacks but struggles with alert fatigue, Illumio finds
Australian organizations lead globally in detecting lateral movement security incidents (97% detection rate) but face severe operational challenges from overwhelming alert volumes and false positives. Security teams receive an average of 2,061 alerts daily, leading to alert fatigue and spending n...
Read More » -
Hackers Now Use RMM Tools for Phishing Attacks
Threat actors are using legitimate remote monitoring and management (RMM) software to gain unauthorized access to devices through deceptive tactics like fake browser updates and fraudulent meeting invitations. These attacks leverage trusted platforms such as ITarian, PDQ, and Atera to establish c...
Read More » -
Boost Incident Response with NETSCOUT Adaptive Threat Analytics
NETSCOUT's **Adaptive Threat Analytics** enhances the Omnis Cyber Intelligence platform, providing faster threat investigation and response tools amid rising incident containment times (averaging 73 days). The solution addresses challenges like **alert fatigue and AI-powered attacks** by offering...
Read More » -
Check Point's Quantum Firewall R82.10: AI & Zero Trust Security
Check Point's Quantum Firewall R82.10 update introduces twenty new features focused on AI security, hybrid network protection, and zero-trust architecture without increasing operational complexity. The software enhances security by preventing threats proactively, offering capabilities like monito...
Read More » -
Infoblox Hits 200 Customers, Unveils New Network Transformation Tools
Over 200 organizations now use Infoblox's Universal DDI Product Suite to modernize network infrastructure, addressing the need for unified solutions in hybrid and multi-cloud environments. The platform integrates essential network services into a single SaaS management plane, reducing manual task...
Read More » -
Extreme Networks: AI Slashes Networking Tasks from Hours to Minutes
Extreme Networks will debut its AI-driven networking platform at GITEX Global 2025, using conversational and multimodal AI to drastically speed up network operations from hours to minutes. The platform automates up to 90% of manual tasks, enhances compliance and device onboarding, and offers full...
Read More » -
Tufin R25-2 Boosts Network & Cloud Security Automation
Tufin Orchestration Suite R25-2 enhances security by providing expanded visibility, comprehensive automation, and stronger controls across hybrid networks from a unified platform. The update introduces key advancements including improved topology accuracy, streamlined SASE policy control, and enh...
Read More »