Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Cisco, Fortinet and WatchGuard have analyzed the exploits leaked from an NSA-linked hacking group. Cisco has found a zero-day vulnerability [Read More]
Social Blade hacked. Details of more than 270,000 users, including passwords, leaked online [Read More]
Is deprecating SMS-based 2FA good advice? SecurityWeek talked to consultants, vendors and practitioners – and found a divergent range of views. [Read More]
FalseCONNECT, a vulnerability that exposes proxy server connections to MitM attacks, affects software from Apple, Microsoft and others [Read More]
Researchers once again bypass the User Account Control (UAC) security feature in Windows – this time they used the Event Viewer [Read More]
Facebook announces winner of 2016 Internet Defense Prize – $100,000 awarded for research on post-quantum security for TLS [Read More]
Researchers detail DiskFiltration, a method that allows hackers to steal data from air-gapped computers using hard drive noise [Read More]
D-Link has patched a critical remote code execution vulnerability affecting several DIR model routers [Read More]
Microsoft has released yet another patch related to the evil maid and remote butler attacks [Read More]
The RC4 cipher has been disabled in Edge (Windows 10) and Internet Explorer 11 (Windows 7 and newer), bringing Microsoft’s browsers in line with Chrome and Firefox. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Joshua Goldfarb's picture
Analytics is becoming ever more important, and in my opinion, it is an important part of the future of information security.
David Holmes's picture
The portion of encrypted traffic keeps rising, so IT security administrators will be forced to do more SSL decryption if they are to get any value at all out of their fancy security tools.
Travis Greene's picture
While Identity and access management (IAM) is a mature discipline supporting internal employee access to applications, what is the future of IAM in support of end customer interactions?
Wade Williamson's picture
Collecting security data is relatively easy – the value of security analytics solutions will rest in how well they reduce that data into answers.
Adam Meyer's picture
Each area of threat intelligence has a different scope of mission, which by default would require a different set of tools and analyst background.
Torsten George's picture
Google Dorking can be used to identify vulnerable systems and trace them to a specific place on the Internet.
Ashley Arbuckle's picture
Regardless of what industry you’re in, your ability to successfully compete in the digital economy requires the ability to securely innovate.
Emily Ratliff's picture
The Assimilation Project performs service discovery and inventory of your systems in great detail and stores the resulting data so that it can be queried.
Jim Ivers's picture
Hackers are human. Hopefully that doesn’t surprise you too much. Being human means that they are subject to human tendencies, like taking the path of least resistance.
Joshua Goldfarb's picture
The trust between those who run the security organization, and the analysts, incident responders, engineers, and others who do the work on a daily basis is extremely important.