Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

AlienVault has closed an impressive $52 million Series E funding round, bringing the total raised by the company to nearly $116 million.
Malicious actors are abusing the Portmapper service to amplify their DDoS attacks, Level 3 has warned.
Dropbox customers can now use USB security keys for two-factor authentication (2FA).
Barracuda Networks has launched a new cloud storage service designed to give business users the ability to securely store, share, and access files from anywhere.
Hackers based in Russia penetrated the email network of the Pentagon's Joint Chiefs of Staff, leading to a two-week shutdown of the system, NBC News reported.
As more organizations become more comfortable with putting data in the cloud, they are aggressively applying varying levels of data protection to different types of information, according to a recent survey.
Enterprise technology provider CA Technologies has signed a definitive agreement to acquire privileged identity management solutions provider Xceedium for an undisclosed sum.
According to the results of a recent survey of 1,071 IT and IT security practitioners, most respondents said that more security incidents are caused by unintentional mistakes rather than intentional and/or malicious acts.
Facebook’s new Security Checkup tool for desktop is now available globally. Mobile version coming soon.
Sharing details of the breach would help other organizations identify if they have also been targeted by this group, security experts said.

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Marc Solomon's picture
How do we handle the responsibility that cloud computing brings? It’s a responsibility that must be shared among vendors, users, business leaders, and IT security professionals and involves three key aspects.
Alan Cohen's picture
If vaults deep within the building protect banks from bank robbers, why do so many security professionals focus so much attention on their data center’s front door?
Jason Polancich's picture
While most businesses feel they should be pursuing more robust cyber intelligence functions, most aren’t actually doing anything about it at all.
Travis Greene's picture
As much fun as it is to wake up to patches waiting to be unwrapped, we don’t want the regret of “exploit Wednesday”, which is far more embarrassing than becoming a victim of a zero-day exploit.
Marc Solomon's picture
Accepting the reality that some attacks will get through, security effectiveness must be measured by how quickly we detect a compromise and stop the exploitation of that attack.
Alan Cohen's picture
Many CISOs say that action they undertake in their first six months on the job is to determine the most valuable and most at-risk actions and take steps to mitigate the risk. How can they take those steps while also addressing the catch-22?
Wade Williamson's picture
Personally Identifiable Information (PII) can provide invaluable human intelligence to nation-state attackers who are often behind the most sophisticated attacks.
David Holmes's picture
As new SSL vulnerabilities surface, we can use our enterprise-specific categorization to decide if it’s going to be a Godzilla day or a Hello Kitty day.
Jason Polancich's picture
In today’s cyber defense world as in other business domains, actions should speak louder than words. Yet, too often, being “actionable” is just that - a word with no meaning.
Travis Greene's picture
Does it really matter if someone steals your healthcare records? What would a hacker do with that information? Sell it? To whom and for what purpose?