Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

In an attempt to provide increased security and privacy for its users, WordPress has announced that upcoming features will require hosts to support HTTPS. [Read More]
Threat actors working on a schedule similar to that of legitimate businesses recently launched large distributed denial of service (DDoS) attacks for ten days in a row. [Read More]
Microsoft researchers release SAMRi10, a new anti-reconnaissance tool for Windows 10 and Windows Server 2016 [Read More]
UK’s GCHQ launches CyberChef, an open source tool designed for analyzing and decoding data [Read More]
Around 900,000 Deutsche Telekom customers using specific models of network routers have had Internet service disrupted by likely deliberate hacking, the company said Monday. [Read More]
Vulnerabilities in Microsoft’s Azure cloud platform could have been exploited to gain access to RHEL virtual machines and storage accounts [Read More]
A laptop containing the personal details of more than 130,000 sailors has been compromised, the U.S. Navy revealed [Read More]
Users can now check whether their network is exposed to Mirai, one of the most prolific botnets to have targeted Internet of Things (IoT) devices this year. [Read More]
Researchers have detected 57 Million Scans for a backdoor in Netis routers through the UDP port 53413. [Read More]
Starting on February 14, 2017, Microsoft’s Edge and Internet Explorer 11 web browsers will no longer load sites protected with a SHA-1 certificate. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

David Holmes's picture
What are the possible threat vectors if you were doing a threat model assessment for any of cloud passwords management models?
Marie Hattar's picture
Monitoring and securing modern network flows requires granular insight, only possible through sophisticated and automated analytics and security tools.
Eddie Garcia's picture
To reduce the chances of falling victim to an insider-driven breach, security and risk professionals should start by learning what their available data can tell them.
Marc Solomon's picture
Intelligence-driven security starts with changing how we collect and manage the millions of points of threat data that analysts are bombarded with every day.
Ashley Arbuckle's picture
By aligning your segmentation strategy to business objectives you can respond quickly to the needs of the business while reducing risk and protecting data and applications.
Lance Cottrell's picture
The old castle wall model of perimeter security is almost worthless and often leads to poorly designed architectures and strategies.
Ken McAlpine's picture
When looking to solve IoT security challenges, look for products that support a multi-vendor enforcement fabric to share, synchronize, and automatically respond to threats.
Scott Simkin's picture
In discussions about cybersecurity, a word that gets used a lot is “prevention.” How do you prevent cyberattacks before they succeed?
Aditya Sood's picture
The cloud is here to stay, and so long as employees use cloud apps from within an organization’s firewall, we’ll always have to wrangle with Shadow IT, Shadow Data and the attendant problems and risks.
Erin O’Malley's picture
Visibility—delivered via a centralized platform—is the only thing that is going to bring order to the kluge that is the modern-day network.