Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

ThreatConnect launches new suite of threat intelligence products that help companies understand adversaries and automate security operations [Read More]
An increasing number of custom apps are being moved into cloud infrastructures (primarily AWS, Azure and Google Cloud Platform) without the security team necessarily being aware that they exist. [Read More]
RSA improves several products and launches new services as it unveils its Business-Driven Security offering [Read More]
Microsoft unveiled several new security capabilities in Office 365, including Office 365 Secure Score, Threat Intelligence Private Preview, and Advanced Data Governance Preview. [Read More]
A new survey of American adults' perceptions of cybersecurity and hackers shows both a generational and a gender divide in attitudes. [Read More]
Potentially serious DoS vulnerability patched this week in the DNS software BIND [Read More]
Israeli startup Empow Cyber Security announced on Thursday that it has raised $9 million in a Series A funding round. [Read More]
Cisco launches Umbrella, a cloud-based secure internet gateway designed to provide visibility and protection outside the corporate network [Read More]
A backdoor found in the default configuration of the Unanet web application allows an unauthenticated attacker to login and manipulate user accounts and the roles they maintain. [Read More]
F5 Networks BIG-IP appliances are affected by a vulnerability dubbed Ticketbleed that allows a remote attacker to extract memory [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Scott Simkin's picture
Attackers have developed anti-VM analysis techniques to allow the malware to recognize when it is being run on a virtual machine and fail to execute, meaning the system or threat analytics cannot make a verdict determination or extract intelligence from the sample.
Adam Meyer's picture
Cyber threat intelligence needs to be tailored to its audience as it means different things to different people, whether it’s on-the-network defenders, Red Teams, threat analysts, risk officers, business executives and Board of Directors, legal, application owners, and so on.
Jennifer Blatnik's picture
Focusing on securing an endless amount of endpoints is almost impossible to do effectively. You can’t rely on the devices to be secure and you can’t rely on the consumers to secure their devices themselves.
Marc Solomon's picture
Threat intelligence has a shelf life, but there’s not a well-defined, industry standard on how to expire threat intelligence.
Marie Hattar's picture
To fully realize the benefit of the Public Cloud, it is vital that the same due diligence applied to a physical network is applied to a cloud-based infrastructure.
Alan Cohen's picture
While there are clear security benefits gained through network segmentation, the principal goal of creating subnets is to improve performance, avoiding broadcast storms and latency stimulated by our insatiable requirement for bandwidth.
Jim Ivers's picture
Savvy organizations have learned how to use a mix of static and dynamic application security testing types to increase their coverage and lower their risk.
Rafal Los's picture
Do you ever find yourself trying to protect your organization from exotic attack scenarios that are highly unlikely or that would have a minimal impact on you?
Ashley Arbuckle's picture
The healthcare industry has a lot to gain by digital transformation. However it also has a lot to lose if it doesn’t start with security as a foundation.
Marc Solomon's picture
Analysts must work together and across the organization to provide the right intelligence in the right format and with the right frequency so that it can be used by multiple teams.