Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

According to a new report analyzing 10 million passwords, the top 25 most popular passwords are used to secure over 50% of online accounts. [Read More]
A flaw in Samsung SmartCam cameras allows a remote attacker to execute arbitrary commands with root privileges [Read More]
Advantech patches authentication bypass and SQL injection vulnerabilities in its WebAccess HMI/SCADA product [Read More]
An estimated 35,000 Elasticsearch clusters exposed to the public Internet are potential victims to a series ransom attacks that have already hit over 33,000 MongoDB databases. [Read More]
Aerospike Database Server affected by critical and high severity remote code execution and information disclosure vulnerabilities [Read More]
Hacker claims to have stolen 900 Gb of data from Israeli mobile forensics company Cellebrite [Read More]
Google has launched a beta version of a new Cloud Key Management System (KMS) to supplement the existing Google-managed server-side encryption and customer-controlled on-premise key management. [Read More]
GoDaddy has revoked nearly 9,000 certificates after discovering a bug that caused the domain validation process to fail [Read More]
Trend Micro's Zero Day Initiative (ZDI) paid out nearly $2 million in 2016 for vulnerabilities [Read More]
Nearly 33,000 MongoDB databases have been hijacked as of today, the latest numbers associated with a series of attack campaigns that have been picking up pace over the past couple of weeks show. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Ashley Arbuckle's picture
The healthcare industry has a lot to gain by digital transformation. However it also has a lot to lose if it doesn’t start with security as a foundation.
Marc Solomon's picture
Analysts must work together and across the organization to provide the right intelligence in the right format and with the right frequency so that it can be used by multiple teams.
Lance Cottrell's picture
When properly integrated, detection, response, and prevention reinforce each other, each making the other more effective.
Travis Greene's picture
Whether US government officials improve their handling of classified information in the new administration or not, industry can certainty learn from the blunders and reduce risks.
Torsten George's picture
While machine learning can help reduce time-to-remediation, will it ever be able to autonomously protect organizations against cyber-attacks?
Avi Chesla's picture
Our cybersecurity ecosystem needs to be simplified – this is a fundamental challenge that the industry has avoided talking about. This need for simplification is what lies at the core of “Security Abstraction “
Joshua Goldfarb's picture
While sprinting from distraction to distraction may fool some people, it won’t fool nearly enough to justify the risk it introduces into your organization.
Alan Cohen's picture
Organizations of any size can do one important thing to help address this challenge: better segment their interior networks and data center operations.
Adam Meyer's picture
While organizations can’t really impact cybercriminals’ intent or capability, placing greater focus on reducing the bad guys’ opportunity - especially as the level of presence is growing - should be at the top of your security to-do list in 2017.
Ken McAlpine's picture
Dozens of isolated security tools and platforms, regardless of how relevant they are to new cloud-based networks, create their own problem.