Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Following the discovery of Heartbleed, the OpenSSL Project has created a new security policy and patched a total of 16 vulnerabilities in the open source library.
The RSA Advanced Security Operations Center (SOC) Solution offers an integrated set of technologies and services that can provide SIEM, Network Forensics, and Endpoint threat protection.
CloudLock has launched a new solution designed to detect, classify and secure sensitive data stored in Google Drive in near real-time.
U.S. law enforcement authorities claim to have leveraged a leaky CAPTCHA on the login page of Silk Road to identify the real IP address of the server hosting the website.
Salesforce Account administrators have been notified that Salesforce customers are being targeted by key-logging malware known as Dyre.
Security industry experts have analyzed the attack of iCloud user accounts and commented on the impact of the incident on Apple's reputation, and provided recommendations on how to avoid such leaks in the future.
Chinese authorities have started intercepting encrypted traffic to and from Google's servers, in an apparent man-in-the-middle (MitM) attack against the encrypted traffic between CERNET and Google.
Apple is ramping up iCloud defenses in the aftermath of hackers swiping nude photos of celebrities from the online digital vault, the Wall Street Journal reported.
Remote connectivity services provider LogMeIn announced the acquisition of Meldium, a startup that specializes in cloud-based single-sign-on (SSO), password management, and identity and access management (IAM) solutions.
The popular Slider Revolution WordPress plugin that enables users to easily create responsive sliders is plagued by a security hole that has been actively exploited by cybercriminals.

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Joshua Goldfarb's picture
Although it may be tempting to envision a world where the analyst has been fully automated, this does not seem particularly reasonable.
Pat Calhoun's picture
Being connected is critical and all the elements of an organization’s security platform should work in concert together to provide adaptive security for the entire environment.
Rebecca Lawson's picture
There is a common misconception that in order to move to virtual security solutions, companies can, or should, replace physical security technologies they rely on to keep their networks safe today.
Travis Greene's picture
If you can’t interpret user activity with the context of identity and what is normal behavior, your organization may be living with a false sense of security, providing a significant window of opportunity for attackers.
Danelle Au's picture
The recent iCloud attack brings up very important considerations on data security, not only for consumers, but for any enterprise that uses the cloud.
Jason Polancich's picture
Collecting just a small amount of info regularly and diligently for your supply chain can not only help you secure your back doors, but the front entrances too.
Scott Simkin's picture
Enterprises must tailor their security policy and protections to the actual threats they experience and to the threat landscape at large.
James McFarlin's picture
Creative disruption, where a paradigm shift in thinking replaces an existing order, may be an elusive concept but its power as a driving force of human behavior cannot be denied.
Marc Solomon's picture
With the right information, security professionals can quickly pivot from detection to a full understanding of the scope of the outbreak and take action to head off wider compromises
Travis Greene's picture
The significant breaches of today are executed by people infiltrating the organization, and attackers are doing this by assuming identities or abusing insider privileges.