Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

ThreatConnect, an Arlington, VA.-based threat intelligence platform platform provider, has closed a Series B Funding round in excess of $16 Million. [Read More]
Hackers breached the systems of anti-adblocking service PageFair and used the access to deliver malware [Read More]
Researchers have found a way to bypass Microsoft EMET mitigations with one shot via the WoW64 Windows subsystem. [Read More]
ThreatQuotient launched ThreatQ, a threat intelligence platform designed to manage and correlate threat data from external sources with internal security and analytics solutions. [Read More]
The stable series of Grsecurity’s Linux kernel patches will no longer be publicly available. Decision comes in response to GPL violations by the embedded Linux industry. [Read More]
DigiCert has acquired the CyberTrust Enterprise SSL business from Verizon Enterprise Solutions. [Read More]
Tech companies, civil liberties and privacy activists urged the White House to pull back efforts to weaken encryption or include law enforcement "backdoors" on technology products. [Read More]
Systems and security management company Tanium has secured an additional $52 million in funding from Silicon Valley VC firm Andreessen Horowitz. [Read More]
If you want to make your case for investing in advanced threat protection to your company’s executives, then you’ll need to think like your executives. [Read More]
Attackers hacking into American computer networks appear to be leaving "cyber fingerprints" to send a message that critical systems are vulnerable, Admiral Michael Rogers, director of the NSA and head of US Cyber Command, said Thursday. [Read More]

FEATURES, INSIGHTS // Security Architecture

rss icon

Wade Williamson's picture
By building security controls that identify and correlate the malicious behaviors of an attack, we can begin to the tip the scales back in our favor.
Pat Calhoun's picture
While individual products and technologies are important weapons, they operate in a silo and lose sight of the bigger picture. The reality is that you can’t just rely on a single defense or a silver bullet.
Marcus Ranum's picture
When you start keeping a long-term data series, remember that you can't change your algorithm for interpreting it on a regular basis.
Joshua Goldfarb's picture
While intelligence is a critical component of a mature security program, it should not drive security. A risk-driven approach provides a much more comprehensive and scientific approach that allows organizations to keep pace with today’s sophisticated threats.
Nate Kube's picture
Nate introduces various perspectives on cybersecurity as a moniker, shares some illuminating data, and presents a vernacular to move our field forward.
Torsten George's picture
The NIST Cybersecurity Framework is an important building block, but still just the first step towards implementing operationalized defenses against cyber security risks.
Avi Chesla's picture
In order to be effective, security solutions must become more directly associated, in real-time, to cyber defense planning models.
Joshua Goldfarb's picture
Is budget a good metric for security? In other words, if an organization wishes to improve its security posture, is spending more money an appropriate response?
Rebecca Lawson's picture
There is a common misconception that in order to move to virtual security solutions, companies can, or should, replace physical security technologies they rely on to keep their networks safe today.
Joshua Goldfarb's picture
An organization that keeps records of its security incidents should be able to study that data to understand the top ways in which it is generally becoming compromised.