Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Cisco warned on Thursday that as a result of default encryption keys in three of its security products, customers are at risk of an unauthenticated remote attacker being able intercept traffic or gain access to vulnerable systems with root privileges.
In an analysis of 660,000 pieces of information collected, Recorded Future found login credentials for 89 unique domains possibly belonging to government agencies.
Thirty-two percent of respondents who admitted experiencing a breach said they couldn't e
Cryptzone, a Waltham, Mass-based provider of application and content security solutions, has closed a $15 million Series B round of funding.
While container adoption is likely to surge over the next few years, concerns around security, certification and adequate skills remain, according to a recent survey commissioned by Red Hat.
Wikipedia will use HTTPS for all traffic to ensure users' safety and privacy. The transition will be completed within two weeks, says the Wikimedia Foundation.
US technology companies are getting hit harder than anticipated by revelations about surveillance programs led by the National Security Agency, a study showed Tuesday.
Security startup Menlo Security emerged from stealth armed with $25 million in funding from the closing of a Series B funding round.
NIST has released an updated version of its industrial control systems (ICS) cyber security guide. Vulnerabilities, risk management, best practices, security architectures, and tools sections updated.
Visa and FireEye announced plans to co-develop tools and services to help merchants and issuers protect against advanced cyber attacks targeting payment data.

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Rafal Los's picture
Often times it’s the insiders that enable the external attacker – either willingly or otherwise, and the result can be even more devastating than that of an external attacker.
Travis Greene's picture
Can IT security find a way to coexist with wearables faster than the first BYOD war and avoid a second war?
Scott Simkin's picture
In the moments after a breach, security teams will often focus on the event itself, but not draw additional insight from the attack, or analyze the events surrounding it.
Joshua Goldfarb's picture
When moving to the cloud, companies must understand the implications, enumerate the risks, and mitigate those risks accordingly.
Alan Cohen's picture
Today’s network perimeter is increasingly not a single physical or virtual place, yet much of the industry debate is still focused on the perimeter.
Wade Williamson's picture
In light of the seemingly endless parade of high-profile breaches, it’s easy to focus on external threats, while losing sight of insider threats.
Rebecca Lawson's picture
Although technology products are time and time again heavily relied on and placed at the forefront of defense, there is another critical element that needs just as much focus: training the next generation of technology professionals.
Alan Cohen's picture
Just as enterprise computing is having a DevOps moment, much of the security profession has woken up to the fact they are mired in the traditional infrastructure and silo approach.
Marc Solomon's picture
Just as the graduating class of 2015 will evolve how they operate to realize their full potential in the real world, we must evolve our approach to security in the Digital Economy.
Jason Polancich's picture
Without a solid base in knowing who you are as a target and what’s going on around you at all times, everything else you do is essentially a half-measure.