Security Experts:

Security Infrastructure
long dotted


Despite it's privacy and end user security benefits, SSL and TLS traffic encryption brings its own problems for businesses. Encryption is already used by criminals to hide malicious traffic on the basis that defenders cannot find what they cannot see. [Read More]
It took Microsoft only 7 hours to patch a serious Office 365 vulnerability that could have been exploited to hack into accounts [Read More]
A new version of the NTP daemon patches several low and medium severity vulnerabilities [Read More]
Qatar National Bank (QNB) launches investigation after someone leaked data allegedly stolen from its systems [Read More]
Researcher discovers publicly accessible database containing 93 million records associated with Mexican voters [Read More]
DDoS attacks have been growing in both size and sophistication for years, but Imperva’s latest report provides a glimpse into some new tools and attack methods being used by threat actors. [Read More]
Cisco patches several critical and high severity vulnerabilities affecting the company’s Wireless LAN Controllers [Read More]
2016 Trustwave Global Security Report details application security, cybercrime, breaches and other aspects of the threat landscape [Read More]
Shortened URLs can be used to discover and read shared content stored in the cloud, including files for which the user didn’t create a short URL, researchers have demonstrated. [Read More]
A DNS configuration issue on a Western Digital server exposed user data that could have been highly valuable to malicious actors [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Avi Chesla's picture
Security technologies must be provisioned with the right policy in order to ensure it complements the neighboring solution, and must also be activated in the right sequence.
Shlomo Kramer's picture
When it comes to deciding why you should re-evaluate security vendors, the solution’s roadmap is of strategic importance because it may require technical analysis and rethinking of the overall network security architecture.
Alan Cohen's picture
By utilizing security technologies that are “invisible” to the infrastructure, you can reduce, rather than add to, IT and security’s burdens.
Travis Greene's picture
When big stories like the release of the Panama Papers breaks, it is an opportunity to self-evaluate what level of risk your organization could be exposed to.
Rafal Los's picture
Attackers are exploiting issues in corporate identity stores with greater frequency. If you doubt the danger that identities pose to your organization, you should conduct a simple test.
Bill Sweeney's picture
Enterprises have to worry about the surface area that is open for attack and the challenge of detecting attacks quickly when they are occurring. In every instance simplification will help.
Scott Harrell's picture
Granular network segmentation is a security best practice that dramatically curtails the ability of attackers to move about the network, limiting the spread of destructive malware and ransomware and helping to keep critical assets safe.
David Holmes's picture
How do you secure application components when they’re shifting from cloud to cloud? Any traffic traversing from one public cloud to another is by definition crossing the Internet and should therefore not be trusted.
Wade Williamson's picture
The ability to quickly and reliably detect lateral movement in the network is one of the most important emerging skills in information security today.
Jennifer Blatnik's picture
While it’s important to have multiple layers of defense, more emphasis needs to be placed on how companies integrate, update and manage their security.