Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

ThreatConnect, an Arlington, VA.-based threat intelligence platform platform provider, has closed a Series B Funding round in excess of $16 Million. [Read More]
Hackers breached the systems of anti-adblocking service PageFair and used the access to deliver malware [Read More]
Researchers have found a way to bypass Microsoft EMET mitigations with one shot via the WoW64 Windows subsystem. [Read More]
ThreatQuotient launched ThreatQ, a threat intelligence platform designed to manage and correlate threat data from external sources with internal security and analytics solutions. [Read More]
The stable series of Grsecurity’s Linux kernel patches will no longer be publicly available. Decision comes in response to GPL violations by the embedded Linux industry. [Read More]
DigiCert has acquired the CyberTrust Enterprise SSL business from Verizon Enterprise Solutions. [Read More]
Tech companies, civil liberties and privacy activists urged the White House to pull back efforts to weaken encryption or include law enforcement "backdoors" on technology products. [Read More]
Systems and security management company Tanium has secured an additional $52 million in funding from Silicon Valley VC firm Andreessen Horowitz. [Read More]
If you want to make your case for investing in advanced threat protection to your company’s executives, then you’ll need to think like your executives. [Read More]
Attackers hacking into American computer networks appear to be leaving "cyber fingerprints" to send a message that critical systems are vulnerable, Admiral Michael Rogers, director of the NSA and head of US Cyber Command, said Thursday. [Read More]

FEATURES, INSIGHTS // Security Architecture

rss icon

Joshua Goldfarb's picture
Taking a look at security from a different vantage point that allows us to correlate activity by user, rather than by system alone gives us a very different perspective.
Scott Simkin's picture
When vendors and individuals attempt to keep threat intelligence private, they limit the ability of the entire group to identify and mitigate new threats as they are developed and launched against organizations.
Joshua Goldfarb's picture
Rather than proceed step by step through the process of building and maturing a security operations function, security teams often want to move immediately into very advanced topics.
Alan Cohen's picture
Today’s network perimeter is increasingly not a single physical or virtual place, yet much of the industry debate is still focused on the perimeter.
Jason Polancich's picture
Without a solid base in knowing who you are as a target and what’s going on around you at all times, everything else you do is essentially a half-measure.
Rafal Los's picture
Security leaders struggle to replicate successes from one enterprise to another largely because they are starting from scratch at every new turn.
Joshua Goldfarb's picture
The question of build or buy is not a new one, but it is one that does not adequately suit the implementation of a security solution.
Joshua Goldfarb's picture
Tree rings occur when the growing season ends and growth stops. To avoid stagnation, a security organization must never stop growing.
Wade Williamson's picture
By building security controls that identify and correlate the malicious behaviors of an attack, we can begin to the tip the scales back in our favor.
Pat Calhoun's picture
While individual products and technologies are important weapons, they operate in a silo and lose sight of the bigger picture. The reality is that you can’t just rely on a single defense or a silver bullet.