Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Cisco has patched a critical flaw in a unified computing solution and is preparing fixes for products affected by a recently disclosed ASN1C compiler bug [Read More]
The products of many major software vendors could be exposed to attacks due to vulnerabilities in Oracle’s Outside In SDKs [Read More]
Researchers find several critical vulnerabilities in Dell’s SonicWALL Global Management System product [Read More]
RSA announced a new RSA SecurID Suite, moving from two-factor authentication to a full identity and access management solution. [Read More]
Organizations are increasingly aware about the risk of unprotected privileged accounts, but they still fail to enforce best practices [Read More]
A critical code execution vulnerability in an ASN.1 compiler exposes mobile devices and networks to remote attacks [Read More]
Hooking and injection vulnerabilities in security products allow attackers to bypass exploit mitigations and compromise systems [Read More]
Researcher demonstrates how hackers could have stolen money from Google, Microsoft and Facebook by leveraging flaws in phone verification services [Read More]
Two-thirds of European consumers want to use biometrics to make payments easier and more secure, according to research commissioned by Visa. [Read More]
Cisco and Juniper Networks release updates to patch high severity vulnerabilities in their operating systems [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Ken McAlpine's picture
While consuming, consolidating, and correlating information provides obvious benefits, always keep in mind how you and your organization can also contribute back to these information feeds.
Joshua Goldfarb's picture
Analytics is becoming ever more important, and in my opinion, it is an important part of the future of information security.
David Holmes's picture
The portion of encrypted traffic keeps rising, so IT security administrators will be forced to do more SSL decryption if they are to get any value at all out of their fancy security tools.
Travis Greene's picture
While Identity and access management (IAM) is a mature discipline supporting internal employee access to applications, what is the future of IAM in support of end customer interactions?
Wade Williamson's picture
Collecting security data is relatively easy – the value of security analytics solutions will rest in how well they reduce that data into answers.
Adam Meyer's picture
Each area of threat intelligence has a different scope of mission, which by default would require a different set of tools and analyst background.
Torsten George's picture
Google Dorking can be used to identify vulnerable systems and trace them to a specific place on the Internet.
Ashley Arbuckle's picture
Regardless of what industry you’re in, your ability to successfully compete in the digital economy requires the ability to securely innovate.
Emily Ratliff's picture
The Assimilation Project performs service discovery and inventory of your systems in great detail and stores the resulting data so that it can be queried.
Jim Ivers's picture
Hackers are human. Hopefully that doesn’t surprise you too much. Being human means that they are subject to human tendencies, like taking the path of least resistance.