Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Security research and product-testing firm NSS Labs announced today it has secured $7 Million in additional equity and debt funding.
AlienVault launches Open Threat Exchange (OTX) 2.0 Beta. The security startup has redesigned its threat exchange platform and opened access to the entire security community.
Washington is "aggressively" warning Beijing over the repercussions of its demand that US tech firms should hand over their encryption keys if they want to do business in China.
Verizon's 2015 Data Breach Investigations Report (DBIR) analyzed 79,790 security incidents and 2,122 confirmed data breaches across 61 different countries.
The "Re-Direct to SMB" vulnerability impacts all versions of Windows, including the upcoming Windows 10, as well as products from major software makers such as Adobe, Apple, Oracle, and Symantec.
Norse introduced a new intelligence service that leverages a combination of automated and human threat monitoring and analysis to help enterprise security teams detect compromised systems and malicious activity.
FireMon has acquired Immediate Insight to improve real-time security event analysis.
Cyber attacks against supervisory control and data acquisition (SCADA) systems doubled in 2014, according to Dell’s annual Threat Report, released Monday.
A recent survey conducted by SANS found that 32 percent of respondents said their firms do not have the ability to prevent an insider attack.
Let's Encrypt takes the world a step closer to a time when more websites would use a certificate and TLS would be the default across the Web, rather than the present where most sites do not even have a valid certificate

FEATURES, INSIGHTS // Security Infrastructure

rss icon

David Holmes's picture
Will containers replace traditional operating system virtualization in the same way that virtualization has replaced much of the physical, bare-metal world? And how secure are containers, anyway?
Pat Calhoun's picture
While individual products and technologies are important weapons, they operate in a silo and lose sight of the bigger picture. The reality is that you can’t just rely on a single defense or a silver bullet.
Rafal Los's picture
Enterprises that don’t operationalize configuration and asset management are doomed to repeat the cycle of lost productivity, frustration and panic.
Jason Polancich's picture
We seem to be at a watershed moment in both the cybersecurity market and with our business cyber defense circumstances.
Marc Solomon's picture
Just as they’ve embraced other technology innovations to advance their businesses, midsized organizations need a new approach to cybersecurity that mitigates risk to valuable digital assets.
Travis Greene's picture
Just like fumbles and interceptions derail a playbook plan, there are two ways that access certifications today are insufficient.
Avi Chesla's picture
Now more than ever, context-based decisions have become a necessity. This is because the identification process of an advanced persistent attack campaign is all about putting events in the right context.
Wade Williamson's picture
By establishing an enterprise-wide context focused on key assets and user behaviors, organizations can build a unified security framework that encompasses all locations and all of their assets.
Rafal Los's picture
As long as the “hikers and bear” analogy is told in boardrooms we will have difficulty communicating the value of a proportionate security model where we design security measures for different types of adversaries with different types of objectives.
David Holmes's picture
Normally you wouldn’t think something as mundane as farming equipment could incite a lot of cyber malice, right? But that’s exactly what happened.