Security Experts:

Security Infrastructure
long dotted


Hackers breached the systems of anti-adblocking service PageFair and used the access to deliver malware
Malicious actors are abusing NetBIOS name servers, RPC portmap, and Sentinel licensing servers in reflection DDoS attacks, Akamai has warned.
Huawei will not have access to customer data under a public cloud computing services partnership with German telecoms operator Deutsche Telekom.
HP has agreed to sell its HP TippingPoint network security line of products to Trend Micro for roughly $300 million, the two companies announced on Wednesday.
Dell on Tuesday announced a series of new security solutions and services aimed at helping enterprises implement new security strategies and protect and backup endpoints.
The director of the NSA Admiral Michael Rogers sought allies at an elite technology conference amid lingering distrust about widespread online snooping.
Thales Group, parent of Thales e-Security, has signed a definitive agreement to acquire data protection firm Vormetric for $400 million.
Facebook has announced a new measure meant to improve the security of user accounts, saying that it has begun notifying users on suspected account compromise.
Dozens of major websites including Netflix, Uber and the BBC went down simultaneously on Thursday in some areas of the United States, but were soon up again in most cases.
Uber on confirmed that a software slip briefly exposed personal data of hundreds of US drivers.

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Travis Greene's picture
The true value of identity is not in creating more defense in depth, which means that identity is not the new perimeter.
David Holmes's picture
If LE succeeds, it might influence the rest of the CA industry to get its act together. It might drive many of the slightly sketchy bargain CA companies out of the market.
Torsten George's picture
IoT opens up companies all over the world to more security threats, and only time will tell if the IoT vendor community can come together to create a common security framework that helps shrink the security risk iceberg and minimize the risk of cyber-attacks.
Alan Cohen's picture
Insecurity of any time stems from a common psychological cause -- fear. Fear is generally a reaction to something immediate that threatens your security or safety. Fear itself can harm one’s judgment and prevent teams from taking action.
Rafal Los's picture
These two key pieces of data from your network infrastructure are invaluable to your security analysis - yet you likely don’t ever look at it, you most certainly don't have access to it and you probably wouldn't be able to make sense of it if you had it.
David Holmes's picture
Secure BGP is a long way off, but the window for obtaining fraudulent certificates via BGP hijacking may be closing anyway, as HTTP pinning sees more and more adoption.
Jason Polancich's picture
it seems most just don’t see that cyber intelligence needs to become a prioritized, resourced part of what they’re already doing.
Travis Greene's picture
In the case of Hilary Clinton's personal email server, we know that Top Secret information was transmitted over a network that likely wasn’t equipped to safeguard it. If her server was a target of foreign state actors, the implications are frightening.
Mark Hatton's picture
The country has become obsessed with a couple of pounds per square inch (PSI) in a football, yet seems to have no issue ignoring simple steps that could greatly improve our overall cyber security.
Wade Williamson's picture
In security circles, 2014 was known colloquially as “the year of the breach.” However, 2015 almost doubled the 2014 tally of breached records, and has done so in the first eight months.