Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Owner of cheating service Ashley Madison offers to pay $11.2 million to settle data breach lawsuits [Read More]
Over 750 domains hijacked and pointed to RIG exploit kit after attackers accessed a web portal belonging to a technical partner of French registrar Gandi [Read More]
An attack called "WPSetup" is targeting fresh WordPress installations to get admin access and execute PHP code in the victim’s web hosting account. [Read More]
Boundary protection weaknesses remain the most prevalent in critical infrastructure sectors, according to assessments conducted in 2016 by ICS-CERT [Read More]
An old Kerberos authentication bypass vulnerability dubbed Orpheus' Lyre has been patched in Windows and some Linux distributions [Read More]
Dell introduces new version of Endpoint Security Suite Enterprise for air-gapped systems using Cylance technology [Read More]
Researchers recently discovered an issue with improperly configured Oracle Access Manager (OAM) 10g that can be exploited by remote attackers to hijack sessions from unsuspecting users. [Read More]
Join this webinar to learn how organizations are moving from simple two-factor authentication to modern, mobile multi-factor authentication for better identity assurance. [Read More]
Trend Micro patches several vulnerabilities that can lead to arbitrary command execution in its Deep Discovery Director product [Read More]
Human error led to the personal details of millions of Verizon customers being exposed online, but the telecoms giant has downplayed the incident [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Alan Cohen's picture
Since VMware introduced the concept of micro-segmentation for data center security, the security and networking industry have been racing to introduce competing technologies to reduce the lateral spread of bad actors in the data center and cloud.
Alastair Paterson's picture
By using best practices to protect credentials, while at the same time monitoring for leaked credentials and changes in the tools attackers use, you can mitigate the risk of account takeovers to your organization.
Preston Hogue's picture
Today an organization may have thousands of apps on the internet, but having thousands of monolithic security devices just isn’t practical.
Scott Simkin's picture
Traditional methods of creating, delivering and operationalizing security innovations have grown ever more complex due to a combination of several market factors.
Eddie Garcia's picture
Apache Spot is in its early stages yet it already has all the potential to be the platform where the good guys collaborate, sharing models and algorithms to find the bad actors.
Ken McAlpine's picture
Once you’ve decided that you need to include some SD-WAN capabilities to your network, you should also look at the implications to your security practices.
Ashley Arbuckle's picture
When it comes to automation, most defenders are operating at a deficit. So what’s holding so many enterprises back from incorporating automation in their security programs?
Ting-Fang Yen's picture
With the commoditization of cloud computing in recent years, fraudsters and cybercriminals alike have started to take advantage of public cloud services and dedicated/virtual hosting to conduct attacks.
Oliver Rochford's picture
Einstein is often quoted as having said that insanity is doing the same thing again and again and expecting a different result. When it comes to cybersecurity, based on that definition, we must all be insane.
Preston Hogue's picture
Defenders need a new type of counterinsurgent security that can move out into the jungle to protect users and sensitive data against attackers who disguise their exploits with the very encryption that we think keeps us safe.