Security Experts:

Security Infrastructure
long dotted


IBM brings QRadar-powered log management and security intelligence services to the cloud.
New ThreatStream OPTIC Apple Watch app allows security teams to manage threat intelligence on the go.
CipherCloud launches Cloud Discovery Enterprise Edition. The solution provides visibility, risk scoring, and intelligence across cloud applications.
The growth of the Internet of Things and the security challenges it poses are among the security topics being discussed at the RSA Conference.
Qualys updates Web Application Firewall to version 2.0. WAF 2.0 includes virtual patching and event response capabilities.
Cryptzone launches AppGate Secure Access, a gateway solution that provides a secure tunnel between users and apps to prevent unauthorized access.
HP has teamed up with various security firms in an effort to enhance and expand its security portfolio. New offerings have been announced for cloud, mobile, threat detection and response, and intelligence sharing.
ThreatMetrix unveils Digital Identity Network, an identity protection solution based on device and behavior profiles created through the analysis of 1 billion transactions per month.
The security industry comments on the latest Verizon Data Breach Investigations Report (DBIR).
WikiLeaks published thousands of documents on Thursday from last year's Sony hacking scandal, calling them an insight into the inner workings of a "secretive" firm.

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Marc Solomon's picture
To reduce time to detection and time to resolution, threat intelligence must be tactical, contextual, automated, and easily shared.
Travis Greene's picture
The recent development of the democratization of Machine Learning is an indication that it’s time to consider adding it to our security arsenal, as it offers an opportunity to more dynamically measure risk.
Rafal Los's picture
As a potential buyer and consumer of security solutions, how do you know what technologies, products and services will address your needs?
David Holmes's picture
Will containers replace traditional operating system virtualization in the same way that virtualization has replaced much of the physical, bare-metal world? And how secure are containers, anyway?
Pat Calhoun's picture
While individual products and technologies are important weapons, they operate in a silo and lose sight of the bigger picture. The reality is that you can’t just rely on a single defense or a silver bullet.
Rafal Los's picture
Enterprises that don’t operationalize configuration and asset management are doomed to repeat the cycle of lost productivity, frustration and panic.
Jason Polancich's picture
We seem to be at a watershed moment in both the cybersecurity market and with our business cyber defense circumstances.
Marc Solomon's picture
Just as they’ve embraced other technology innovations to advance their businesses, midsized organizations need a new approach to cybersecurity that mitigates risk to valuable digital assets.
Travis Greene's picture
Just like fumbles and interceptions derail a playbook plan, there are two ways that access certifications today are insufficient.
Avi Chesla's picture
Now more than ever, context-based decisions have become a necessity. This is because the identification process of an advanced persistent attack campaign is all about putting events in the right context.