Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Microsoft intends to dominate the corporate cloud, and everything it does is based on that intention. Google, however, seems to have lost its way. [Read More]
Vulnerabilities found by researchers in one of LG’s NAS products allow hackers to remotely gain admin access to devices [Read More]
Cisco has updated AsyncOS for Web Security Appliance to patch several high severity DoS vulnerabilities [Read More]
The University of Texas at Austin is now claiming a breakthrough. [Read More]
Analysis of more than 600 enterprise users of Office 365 products found that users are continuing to store sensitive data unencrypted in the Microsoft cloud. [Read More]
Bug bounty hunter earns $5,000 for a stored XSS vulnerability in Google’s Cloud Platform Console [Read More]
Starting on June 16, 2016, the old SSLv3 and RC4 security protocols will no longer be supported on Google’s SMTP servers and on Gmail’s web servers. [Read More]
In a legal brief, Mozilla warns that “the security of millions of individuals using Mozilla’s Firefox Internet browser could be put at risk by a premature disclosure of the vulnerability. [Read More]
Congress is tightening security by controlling its users' access to certain cloud services, including blocking Yahoo Mail and Google apps. [Read More]
Onapsis warns that there are indicators of exploitation against 36 large-scale global enterprises around the world. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Alan Cohen's picture
If security can increasingly be distributed into the compute layer—effectively a form of self-protection—we begin to shift the playing field from attacker to defenders.
Adam Meyer's picture
All three types of intelligence help drive decisions and ultimately outcomes, but at different levels within the business.
Travis Greene's picture
Passwords really are that bad, and we now have another mandate to address this ongoing issue, or, the so-called elephant in the room: The growing push for multi-factor authentication.
Ken McAlpine's picture
The emergence of IoT may finally be the technology that brings security from a network afterthought and bolt-on technology to an integral, persistent, omnipresent part of the network.
Avi Chesla's picture
Security technologies must be provisioned with the right policy in order to ensure it complements the neighboring solution, and must also be activated in the right sequence.
Shlomo Kramer's picture
When it comes to deciding why you should re-evaluate security vendors, the solution’s roadmap is of strategic importance because it may require technical analysis and rethinking of the overall network security architecture.
Alan Cohen's picture
By utilizing security technologies that are “invisible” to the infrastructure, you can reduce, rather than add to, IT and security’s burdens.
Travis Greene's picture
When big stories like the release of the Panama Papers breaks, it is an opportunity to self-evaluate what level of risk your organization could be exposed to.
Rafal Los's picture
Attackers are exploiting issues in corporate identity stores with greater frequency. If you doubt the danger that identities pose to your organization, you should conduct a simple test.
Bill Sweeney's picture
Enterprises have to worry about the surface area that is open for attack and the challenge of detecting attacks quickly when they are occurring. In every instance simplification will help.