Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Industry-wide cyber attack exercises (CyberRX) will examine broad and segment-specific threats targeting information systems, medical devices and other essential technology resources of the healthcare industry.
Keeping to tradition, SecurityWeek invited security experts to weigh in on New Year's resolutions for improving information security and how organizations can better develop new habits in 2014.
Venafi has launched a new product that the company describes as a mobile device "kill switch" which gives IT security teams the ability to instantly cut off mobile access to applications and networks when suspicious activity is detected.
Please join Trend Micro and SecurityWeek on Thursday, Dec. 5th at Ruth's Chris Steakhouse in Bellevue, WA for an interactive security event with great food and open bar!
Please join Trend Micro and SecurityWeek on Thursday, Dec. 5th at Ruth's Chris Steakhouse in Bellevue, WA for an interactive security event with great food and open bar!
The Department of Defense will require defense contractors to incorporate established information security standards on their unclassified networks and to report cyber-intrusion incidents that result in the loss of unclassified controlled technical information.
Implementing a more mature cyber security profile within automation means an investment in both time and resources. Being able to measure business performance in real-time is the first step in justifying the ROI of this much-needed increase in cyber security controls.
Please Join us for an Interactive Security Happy Hour Event on Wednesday in Washington, D.C.
Please join Trend Micro and SecurityWeek on Wednesday, Oct. 30th at Neptune's Waterfront Grill & Bar in San Francisco for an interactive security event with great food and open bar!
Please Join us for an Interactive Security Happy Hour Event on Wednesday in Washington, D.C.

FEATURES, INSIGHTS // Security Architecture

rss icon

Nimmy Reichenberg's picture
A sound network security perimeter architecture requires multiple layers of defense, up-to-date and hardened policies and controls and segmentation.
Mark Hatton's picture
The following is a list of questions that I recommend everyone ask security vendors as an initial filter.
Dr. Mike Lloyd's picture
Risk Management isn’t Just an obligation or something other executives want to see. When done right, it really works.
Michael Callahan's picture
While obscuring website code, server architecture, and security mechanisms doesn’t provide bullet-proof security on its own, it is actually pretty effective.
Chris Coleman's picture
Over the past year the buzz around tracking threat actors has been growing and in my opinion hitting the height of the hype cycle. Relying on behavior profiles alone is a great way to get an unwelcomed outcome.
Ram Mohan's picture
Despite its popularity, security issues exist with outsourcing; to avoid trouble down the road, a proactive, thoughtful and thorough approach at the beginning of the process usually helps.
Dr. Mike Lloyd's picture
Continuous monitoring is a call for maturity in our risk management and assessment processes – check that we’ve locked the doors and that the barn door is closed before the inevitable attack comes.
Shaun Donaldson's picture
When the subject of public cloud computing comes-up, it is inevitable that the concept of ‘risk’ soon follows. But the greatest risk to an organization considering public cloud is not security, it is cost.
Mark Hatton's picture
There is an old saying, that if you want to get ahead, don’t bring your boss problems, bring him or her solutions. The same can be said when it comes to investing in security solutions.
Chris Hinkley's picture
Scaling a company or a critical application within can be as scary as it is exciting. IT stakeholders must be part of a proactively designed strategy that’s ready to be deployed at a moment’s notice. Luckily, you can get well on your way to keep performance and security intact while you scale, by ticking three boxes.