Security Experts:

Security Infrastructure
long dotted


The Clinton Foundation has denied being hacked by Guccifer 2.0 and some evidence suggests that the hacker’s claims could be false [Read More]
EMC has patched several critical and high severity vulnerabilities affecting the management interface of VMAX enterprise storage products [Read More]
Users resetting their Yahoo! passwords might also want to check the list of authorized apps and devices, because iOS Mail will continue to have access to the account even after a password reset, researchers discovered. [Read More]
Cisco warns customers of critical vulnerability in email security appliances caused by an interface that should have been removed after testing [Read More]
Companies spend big money on bug bounty programs to catch vulnerabilities they could have easily identified and fixed in the development phase [Read More]
Security researchers have discovered numerous unpatched security vulnerabilities in the D-Link DWR-932B LTE router / access point, including backdoor accounts and default Wi-Fi Protected Setup (WPS) PIN. [Read More]
Facebook releases Windows version of osquery, a tool that allows security teams to quickly detect and investigate threats [Read More]
Google releases two new tools to help developers prevent XSS attacks using content security policy (CSP) [Read More]
Please join Centrify and SecurityWeek for a live webinar where will discuss guidance from the National Institute of Standards and Technology (NIST) along with best practices and regulation mandates. [Read More]
Illusive Networks has announced SWIFT Guard, described by the company as cyber deception technology designed to protect SWIFT-connected banks from cyber criminals. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Adam Meyer's picture
Cyber threat intelligence isn’t just another tool or layer of protection for your organization. It’s a capability that drives more effective cybersecurity decisions and more investment.
David Holmes's picture
SSL/TLS-encrypted traffic has become so common today that the attack communication with bots now goes undetected by these security solutions.
Travis Greene's picture
As the demand for identity governance in Asian companies grows, the key differentiator is that it’s going to come from a need to reduce risk.
Scott Simkin's picture
Cybersecurity needs to build bridges between the security operations (SecOps), network operations (NetOps) and physical security teams to be successful.
Ashley Arbuckle's picture
Managed Detection and Response (MDR) services differ from traditional managed security services in three ways: speed, accuracy, and focus. Here’s how.
Eddie Garcia's picture
This article explains how to encrypt data in a Hadoop cluster. The tools are available, and if you are brave enough, you could attempt this at home.
Erin O’Malley's picture
To understand SIEM, it’s important to first understand when people started to care about network security. And to do that, we need to take a step back in time.
Jennifer Blatnik's picture
Listen to your coach. Similar to the Olympics, a CSO or CISO needs to be able to lead their team and consider the impact they will have on the broader organization.
Nathaniel Gleicher's picture
Cybersecurity defenders face a similar problem to the Secret Service: they are defending high-value assets that must be protected, but also have to speak to hundreds or thousands of other servers.
Jim Ivers's picture
Organizations should fear security concerns when considering moving applications to the cloud. But they need to recognize that moving web applications to the cloud does not make them secure.