Security Experts:

Security Infrastructure
long dotted


Gigamon launched its GigaSECURE platform that was designed to give enterprises extensive visibility into network traffic, users, applications and suspicious activity.
Microsoft said on Wednesday that its new Advanced Threat Analytics (ATA) solution will be available for general release next month.
UK-based Darktrace, a cybersecurity startup that leverages machine learning and mathematics to detect threats, has raised $22.5 million in Series B funding from investment firm Summit Partners.
RSA has made improvements to the ECAT threat detection and remediation tool, and the Via Lifecycle and Governance identity management solution.
Centrify has unveiled expanded support for Mac OS X computers, the recently released Apple Watch, and Near Field Communication (NFC).
Biometrics-as-a-service provider HYPR announces general availability of biometric tokenization platform.
Many of the cyberattacks suffered by critical infrastructure organizations resulted in physical damage, and experts fear that future incidents could lead to loss of human life.
OpenDNS’s BGP Stream will alert users via Twitter of hijackings and outages involving the Border Gateway Protocol (BGP)
Lloyd's estimated an attack on the U.S. power grid affecting most of the East Coast would result in claims estimated at $21.4 billion.
A little over half of United States-based IT leaders and a third United Kingdom-based leaders believe it would be "easy" for an ex-employee to log in and access systems or information with old passwords.

FEATURES, INSIGHTS // Security Infrastructure

rss icon

David Holmes's picture
As new SSL vulnerabilities surface, we can use our enterprise-specific categorization to decide if it’s going to be a Godzilla day or a Hello Kitty day.
Jason Polancich's picture
In today’s cyber defense world as in other business domains, actions should speak louder than words. Yet, too often, being “actionable” is just that - a word with no meaning.
Travis Greene's picture
Does it really matter if someone steals your healthcare records? What would a hacker do with that information? Sell it? To whom and for what purpose?
Alan Cohen's picture
Like other forms of technical debt, security debt must be paid down, which ultimately leads to a more agile and secure enterprise.
Danelle Au's picture
If your organization is not equipped to deal with the security of Emergent IT, it is probably not equipped to deal with the security of mainstream applications sanctioned by IT.
Wade Williamson's picture
While malware is obviously a critically important tool in the attacker’s arsenal, it is just one of many that make sophisticated attacks successful.
David Holmes's picture
Whether Shodan's John Matherly intends it to or not, Shodan is already exposing the sham of consumer-grade security that we all suspected would be a hallmark of The Internet of Things.
Rafal Los's picture
Often times it’s the insiders that enable the external attacker – either willingly or otherwise, and the result can be even more devastating than that of an external attacker.
Travis Greene's picture
Can IT security find a way to coexist with wearables faster than the first BYOD war and avoid a second war?
Scott Simkin's picture
In the moments after a breach, security teams will often focus on the event itself, but not draw additional insight from the attack, or analyze the events surrounding it.