Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

FireEye's Global Threat Intelligence Sharing initiative will allow customers to bi-directionally share threat intelligence in near real-time.
Register for this webcast to learn how you can align, automate and enforce controls to security and compliance policies - while providing visualization, workflow and reporting critical to improving operational efficiency and reducing audit costs.
The US Army Research Laboratory (ARL) has released the source code for Dshell, a framework that can be used to analyze cyberattacks.
Information-sharing is one of those phrases that get thrown around a lot, but there isn't a lot of agreement on how organizations should be working together or the methods they should be using.
LightCyber, an Israel-based security breach detection and response solutions provider, today announced an improved version of its LightCyber Magna platform.
The US Federal Trade Commission called for better privacy and security to be built into the myriad of connected devices, for fitness, smart homes or other uses.
Suits and Spooks DC will be held at the Ritz-Carlton, Pentagon City on February 4-5. Take a look at the agenda to see why this will be one of the hottest events of the year!
Organizations are increasing investment in IT security, but aren't thinking beyond perimeter-based defenses, according to the latest Ponemon Institute survey.
Security alerts can be highly useful in protecting an organization against a data breach, but inefficient alert management can have serious consequences, a new report shows.
Huawei CEO Ren Zhengfei said at the World Economic Forum that China has never asked it to spy on the United States or others.

FEATURES, INSIGHTS // Network Security

rss icon

David Holmes's picture
If Let’s Encrypt succeeds, will self-signed certificates go extinct? I’m guessing no, and that’s not necessarily a bad thing.
Pat Calhoun's picture
To evade network security defenses, Advanced evasion techniques (AETs) disguise malicious payloads by splitting them into smaller pieces and then delivering the pieces simultaneously, or at varying times, across multiple or rarely used network protocols.
Jason Polancich's picture
Most businesses today are not as secure as they could be due to an inaccurate view of their own cyberdefenses.
Rebecca Lawson's picture
As companies deploy new security technologies, understanding the impact on overall network performance should be a very important factor in the decision-making process.
Joshua Goldfarb's picture
Most enterprises collect huge quantities of data that result in shorter retention periods and longer query times. This perfect storm of circumstances creates a very real operational challenge.
Scott Simkin's picture
It doesn’t take the most advanced tools to break into the the largest corporations on the planet. Between user behavior and the types of malicious files attempting to compromise enterprises, there are a few steps you can take to reduce your risk exposure.
Pat Calhoun's picture
As enterprises continue to expand their arsenal of security products in an effort to strengthen protections against advanced threats, they often introduce complexity.
David Holmes's picture
Many of the hardware RNGs within the load balancers can be tapped to provide real, hardware-based entropy for dozens, hundreds, or even thousands of machines within that data center.
Marc Solomon's picture
“Slow and Low” isn’t just a popular song by the Beastie Boys. It’s also the tempo that adversaries are now choosing to launch attacks and evade detection.
Joshua Goldfarb's picture
The past few decades in the information security field have been dominated by passive failure. Clearly, not every new idea has merit, but those ideas that come about scientifically and methodically have tremendous potential to improve the state of security.