Security Experts:

long dotted


CrowdStrike has launched a new threat intelligence exchange platform that facilitates the access and exchange of threat intelligence between vendor partners.
China-based threat actors are using sophisticated malware installed on handheld scanners to target shipping and logistics organizations from all over the world.
CyberX has raised $2 million in an initial funding round led by Glilot Capital Partners, with participation from the Swarth Group, GlenRock, and angel investor Gigi Levy-Weiss.
Joe Weiss of Applied Control Solutions, John Mallery of MIT, and Jeffrey Carr of Taia Global will hold a panel discussion at Suits and Spooks New York on where the tipping point lies for a cyber attack to turn into a catastrophe.
AIG has expanded its cyber insurance offering to include property damage and bodily injury that could be caused as a result of cyber attacks.
Healthcare organizations are still struggling with information sharing both internally and externally, participants in an industry-wide cyber-security exercise said.
Lockheed Martin will acquire a privately held Industrial Defender, a provider of cyber security solutions for control systems in the oil and gas, utility and chemical industries.
When it comes to securing a Linux machine, the answer is not installing an antivirus or some other security software. The key lies in hardening the operating system.
At the Cybertech Conference, Lockheed Martin and IBM both announced they would invest in CyberSpark R&D facilities, joining other cybersecurity leaders.
China's Internet suffered a massive breakdown as traffic was routed to an overseas site linked to the banned religious group Falun Gong -- a fiasco a cyber-monitoring group Wednesday blamed on the country's own censors.

FEATURES, INSIGHTS // Security Architecture

rss icon

Danelle Au's picture
Zero Trust advocates for a segmented network, and security built into the architecture rather than an afterthought. It also advocates for some key principles built around the concept of “never trust, always verify”.
Jeff Hudson's picture
Making decisions based on anomalies is predicated by one very important assumption—you must understand what “normal” looks like.
Mark Hatton's picture
Just like football, security is a tough game and not for the faint of heart. There are threats lurking around every corner and it’s when you think you are in the clear that a blindside hit is most likely to happen.
Chris Coleman's picture
The threat intelligence space is early and still evolving and enterprise customers are still learning how best to use and action this intelligence.
Nimmy Reichenberg's picture
A sound network security perimeter architecture requires multiple layers of defense, up-to-date and hardened policies and controls and segmentation.
Mark Hatton's picture
The following is a list of questions that I recommend everyone ask security vendors as an initial filter.
Dr. Mike Lloyd's picture
Risk Management isn’t Just an obligation or something other executives want to see. When done right, it really works.
Michael Callahan's picture
While obscuring website code, server architecture, and security mechanisms doesn’t provide bullet-proof security on its own, it is actually pretty effective.
Chris Coleman's picture
Over the past year the buzz around tracking threat actors has been growing and in my opinion hitting the height of the hype cycle. Relying on behavior profiles alone is a great way to get an unwelcomed outcome.
Ram Mohan's picture
Despite its popularity, security issues exist with outsourcing; to avoid trouble down the road, a proactive, thoughtful and thorough approach at the beginning of the process usually helps.