Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

There are at least 110 relays that snoop on Tor hidden services, researchers warn [Read More]
Vulnerabilities in SAP HANA represent a risk to more than 10,000 SAP customers running different versions of the popular business-critical application, Onapsis warns. [Read More]
Microsoft's Azure Security Center is an holistic platform that can combine the customer's own controls with both Microsoft's own and those of its partners [Read More]
Cisco has patched a critical flaw in a unified computing solution and is preparing fixes for products affected by a recently disclosed ASN1C compiler bug [Read More]
The products of many major software vendors could be exposed to attacks due to vulnerabilities in Oracle’s Outside In SDKs [Read More]
Researchers find several critical vulnerabilities in Dell’s SonicWALL Global Management System product [Read More]
RSA announced a new RSA SecurID Suite, moving from two-factor authentication to a full identity and access management solution. [Read More]
Organizations are increasingly aware about the risk of unprotected privileged accounts, but they still fail to enforce best practices [Read More]
A critical code execution vulnerability in an ASN.1 compiler exposes mobile devices and networks to remote attacks [Read More]
Hooking and injection vulnerabilities in security products allow attackers to bypass exploit mitigations and compromise systems [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Ken McAlpine's picture
Once you have an understanding of where your security risks are, you can make better choices about what types and what sources of threat intelligence are most applicable.
Ken McAlpine's picture
While consuming, consolidating, and correlating information provides obvious benefits, always keep in mind how you and your organization can also contribute back to these information feeds.
Joshua Goldfarb's picture
Analytics is becoming ever more important, and in my opinion, it is an important part of the future of information security.
David Holmes's picture
The portion of encrypted traffic keeps rising, so IT security administrators will be forced to do more SSL decryption if they are to get any value at all out of their fancy security tools.
Travis Greene's picture
While Identity and access management (IAM) is a mature discipline supporting internal employee access to applications, what is the future of IAM in support of end customer interactions?
Wade Williamson's picture
Collecting security data is relatively easy – the value of security analytics solutions will rest in how well they reduce that data into answers.
Adam Meyer's picture
Each area of threat intelligence has a different scope of mission, which by default would require a different set of tools and analyst background.
Torsten George's picture
Google Dorking can be used to identify vulnerable systems and trace them to a specific place on the Internet.
Ashley Arbuckle's picture
Regardless of what industry you’re in, your ability to successfully compete in the digital economy requires the ability to securely innovate.
Emily Ratliff's picture
The Assimilation Project performs service discovery and inventory of your systems in great detail and stores the resulting data so that it can be queried.