Security Experts:

Security Infrastructure
long dotted


Dell announced the availability of Dell One Identity Manager 7.0, a modular and integrated platform designed to help organizations unify security policies and improve agility.
In this live webcast, experts from Imperva and Centrify will share best practices on enabling the safe and productive use of cloud apps.
Networking equipment provider D-Link accidentally published a series of private code signing keys when releasing the source code of recent firmware updates under the GPL license.
According to a recent survey of 272 IT decision makers in North America, 91 percent of respondents said they were concerned about the security of containers.
Open certificate authority (CA) Let's Encrypt this week announced the release of its first free digital certificate, taking the world one step closer to making HTTPS implementations easy and free for domain owners.
Attackers are modifying the firmware on Cisco routers to breach enterprise networks. Mandiant has spotted 14 compromised routers across four countries.
Security experts comment on the news that the U.S. Department of Energy was breached 159 times between 2010 and 2014.
NETGEAR has released a firmware update to address a vulnerability in its WMS5316 ProSafe 16AP Wireless Management System that could result in authentication bypass and privilege escalation.
Microsoft has acquired Adallom, an Israeli security startup that helps organizations protect data in cloud applications.
Tripwire launched Tripwire Asset Discovery Appliances, a high-performance, device and application discovery solution that is easy-to-deploy on all types of networks.

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Travis Greene's picture
The true value of identity is not in creating more defense in depth, which means that identity is not the new perimeter.
David Holmes's picture
If LE succeeds, it might influence the rest of the CA industry to get its act together. It might drive many of the slightly sketchy bargain CA companies out of the market.
Torsten George's picture
IoT opens up companies all over the world to more security threats, and only time will tell if the IoT vendor community can come together to create a common security framework that helps shrink the security risk iceberg and minimize the risk of cyber-attacks.
Alan Cohen's picture
Insecurity of any time stems from a common psychological cause -- fear. Fear is generally a reaction to something immediate that threatens your security or safety. Fear itself can harm one’s judgment and prevent teams from taking action.
Rafal Los's picture
These two key pieces of data from your network infrastructure are invaluable to your security analysis - yet you likely don’t ever look at it, you most certainly don't have access to it and you probably wouldn't be able to make sense of it if you had it.
David Holmes's picture
Secure BGP is a long way off, but the window for obtaining fraudulent certificates via BGP hijacking may be closing anyway, as HTTP pinning sees more and more adoption.
Jason Polancich's picture
it seems most just don’t see that cyber intelligence needs to become a prioritized, resourced part of what they’re already doing.
Travis Greene's picture
In the case of Hilary Clinton's personal email server, we know that Top Secret information was transmitted over a network that likely wasn’t equipped to safeguard it. If her server was a target of foreign state actors, the implications are frightening.
Mark Hatton's picture
The country has become obsessed with a couple of pounds per square inch (PSI) in a football, yet seems to have no issue ignoring simple steps that could greatly improve our overall cyber security.
Wade Williamson's picture
In security circles, 2014 was known colloquially as “the year of the breach.” However, 2015 almost doubled the 2014 tally of breached records, and has done so in the first eight months.