Security Experts:

Security Infrastructure
long dotted


Join SecurityWeek and Zscaler for a compelling webcast full of key insights and findings from an assessment of both integrated security platforms and cloud computing/software-as-a-service (SaaS)-based delivery models.
Splunk released Splunk Enterprise Security 4.0 (formerly Splunk App for Enterprise Security) and Splunk User Behavior Analytics (UBA) security solutions.
High-profile data breaches and ever increasing cyber threats are expected to drive global information security spending above the $75.4 billion mark in 2015, according to Gartner.
HP this week announced the roll-out of new enterprise-grade LaserJet printers and multi-functional printers fitted with additional security features designed to prevent malicious attacks from breaching a company’s network.
Dell announced the availability of Dell One Identity Manager 7.0, a modular and integrated platform designed to help organizations unify security policies and improve agility.
In this live webcast, experts from Imperva and Centrify will share best practices on enabling the safe and productive use of cloud apps.
Networking equipment provider D-Link accidentally published a series of private code signing keys when releasing the source code of recent firmware updates under the GPL license.
According to a recent survey of 272 IT decision makers in North America, 91 percent of respondents said they were concerned about the security of containers.
Open certificate authority (CA) Let's Encrypt this week announced the release of its first free digital certificate, taking the world one step closer to making HTTPS implementations easy and free for domain owners.
Attackers are modifying the firmware on Cisco routers to breach enterprise networks. Mandiant has spotted 14 compromised routers across four countries.

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Scott Simkin's picture
When vendors and individuals attempt to keep threat intelligence private, they limit the ability of the entire group to identify and mitigate new threats as they are developed and launched against organizations.
Travis Greene's picture
The true value of identity is not in creating more defense in depth, which means that identity is not the new perimeter.
David Holmes's picture
If LE succeeds, it might influence the rest of the CA industry to get its act together. It might drive many of the slightly sketchy bargain CA companies out of the market.
Torsten George's picture
IoT opens up companies all over the world to more security threats, and only time will tell if the IoT vendor community can come together to create a common security framework that helps shrink the security risk iceberg and minimize the risk of cyber-attacks.
Alan Cohen's picture
Insecurity of any time stems from a common psychological cause -- fear. Fear is generally a reaction to something immediate that threatens your security or safety. Fear itself can harm one’s judgment and prevent teams from taking action.
Rafal Los's picture
These two key pieces of data from your network infrastructure are invaluable to your security analysis - yet you likely don’t ever look at it, you most certainly don't have access to it and you probably wouldn't be able to make sense of it if you had it.
David Holmes's picture
Secure BGP is a long way off, but the window for obtaining fraudulent certificates via BGP hijacking may be closing anyway, as HTTP pinning sees more and more adoption.
Jason Polancich's picture
it seems most just don’t see that cyber intelligence needs to become a prioritized, resourced part of what they’re already doing.
Travis Greene's picture
In the case of Hilary Clinton's personal email server, we know that Top Secret information was transmitted over a network that likely wasn’t equipped to safeguard it. If her server was a target of foreign state actors, the implications are frightening.
Mark Hatton's picture
The country has become obsessed with a couple of pounds per square inch (PSI) in a football, yet seems to have no issue ignoring simple steps that could greatly improve our overall cyber security.