Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Mozilla has been following the certificate-related debate between Symantec and Google, and it largely agrees with the latter [Read More]
DARPA is seeking proposals for hardware architectures that will disarm many of today’s software attacks [Read More]
White hat hackers earned tens of thousands of dollars for finding critical vulnerabilities in GitHub Enterprise [Read More]
Israel-based cybersecurity startup Cymulate announced on Friday that it has raised $3 million through a Series A round of financing led by Susquehanna Growth Equity. [Read More]
ThreatConnect launches new suite of threat intelligence products that help companies understand adversaries and automate security operations [Read More]
New study shows that companies in the US, UK and Germany are increasingly interested in taking out cyber insurance [Read More]
Absolute extends endpoint security self-healing capabilities to third-party applications [Read More]
Palo Alto Networks improves Next-Generation Security Platform with more than 70 new features and launches new firewalls [Read More]
Rapid7 adds hardware bridge to Metasploit framework - penetration testers can use it to analyze IoT hardware and software, ICS and SDR systems [Read More]
Many critical infrastructure organizations have had their IT networks breached. Does that mean their control systems are also vulnerable to attacks? [Read More]

FEATURES, INSIGHTS // Security Architecture

rss icon

Joshua Goldfarb's picture
Tree rings occur when the growing season ends and growth stops. To avoid stagnation, a security organization must never stop growing.
Wade Williamson's picture
By building security controls that identify and correlate the malicious behaviors of an attack, we can begin to the tip the scales back in our favor.
Pat Calhoun's picture
While individual products and technologies are important weapons, they operate in a silo and lose sight of the bigger picture. The reality is that you can’t just rely on a single defense or a silver bullet.
Marcus Ranum's picture
When you start keeping a long-term data series, remember that you can't change your algorithm for interpreting it on a regular basis.
Joshua Goldfarb's picture
While intelligence is a critical component of a mature security program, it should not drive security. A risk-driven approach provides a much more comprehensive and scientific approach that allows organizations to keep pace with today’s sophisticated threats.
Nate Kube's picture
Nate introduces various perspectives on cybersecurity as a moniker, shares some illuminating data, and presents a vernacular to move our field forward.
Torsten George's picture
The NIST Cybersecurity Framework is an important building block, but still just the first step towards implementing operationalized defenses against cyber security risks.
Avi Chesla's picture
In order to be effective, security solutions must become more directly associated, in real-time, to cyber defense planning models.
Joshua Goldfarb's picture
Is budget a good metric for security? In other words, if an organization wishes to improve its security posture, is spending more money an appropriate response?
Rebecca Lawson's picture
There is a common misconception that in order to move to virtual security solutions, companies can, or should, replace physical security technologies they rely on to keep their networks safe today.