Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

NIST has released an updated version of its industrial control systems (ICS) cyber security guide. Vulnerabilities, risk management, best practices, security architectures, and tools sections updated.
Visa and FireEye announced plans to co-develop tools and services to help merchants and issuers protect against advanced cyber attacks targeting payment data.
By deploying Adallom with Dropbox for Business, customers will gain visibility into and control over company data shared and stored within Dropbox.
Centrify has made enhancements in the areas of secure user provisioning, license management, single sign on (SSO) and mobile device management for Office 365 (O365).
Cyphort, a provider of threat detection solutions, has secured $30 million in Series C funding, bringing the total raised by the company to more than $53 million.
Japan's largest mobile service provider, NTT DoCoMo, said it would replace passwords with biometric credentials on a number of its online services, in a step to move users closer to a password-free world.
Palo Alto Networks has acquired Silicon Valley-based CirroSecure, a security startup focused on protecting Software as a Service (SaaS) applications.
Fortinet has agreed to acquire Meru Networks (NASDAQ: MERU), a provider of enterprise wireless networking solutions, for roughly $44 million in cash.
New global initiative backed by security researchers, firms and organizations aims at making smart cities cyber-safe.
Check Point announced the availability of 1200R, a new rugged security gateway appliance designed to protect ICS/SCADA systems.

FEATURES, INSIGHTS // Security Infrastructure

rss icon

David Holmes's picture
DDoS continues to wax and wane in unpredictable cycles, but the ecosystem has evolved to keep it out of the mobile space.
Travis Greene's picture
No IT organization has a seemingly unlimited budget the way that Team Oracle did in the 2013 America’s Cup race. But look closer at why spending on America’s Cup racing seems so out of control and it starts to look a bit more familiar.
Nate Kube's picture
Manufacturing supply chains are vital to the development and fulfillment of any modern technology—they change rapidly and locations of suppliers change. This dynamic nature of the supply chain exposes enterprises to a wide variety of risks.
Wade Williamson's picture
While higher education certainly has some unique challenges, they are by no means alone in terms of facing breaches. Attackers who want to get into a network can typically afford to be patient.
Joshua Goldfarb's picture
Life is full of distractions, and the information security profession is not immune to them. Security professionals have an obligation to remain focused on building, maturing, and improving our security programs and security postures.
Jason Polancich's picture
Cyber defense must develop from a solid foundation in verifiable data into repeatable, measurable processes that mitigate or eliminate risk. With simple risk intelligence, any business can go from nothing to something much faster.
Marc Solomon's picture
By embedding security everywhere across the extended network, not only does security become more effective against advanced attacks, it also becomes a business enabler.
Travis Greene's picture
Security teams must bear equal, if not more responsibility, for reducing the risk of credential fatigue leading to inadvertent exposure.
Mark Hatton's picture
In the world of security, there is often a significant difference between perceived reality and what is actually happening, and the public’s perception of security within your organization can be just as important as reality.
David Holmes's picture
After the rounds of predictions for 2014, I had bet my colleague that if no mobile DDoS appeared this year, we’d stop talking about it. And it looks like we can.