Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Many financial services organizations do not have a concerted cloud strategy with appropriate controls and security, according to a new report from the Cloud Security Alliance.
Radware, a provider of application delivery DDoS attack protection solutions, this week unveiled its latest attack mitigation platform designed to help carriers and cloud providers protect against high volume DDoS attacks.
Mozilla will introduce OneCRL to streamline the certificate revocation process. The feature will be available starting with Firefox 37.
Researchers uncovered vulnerability that enables attackers to decrypt HTTPS-protected traffic.
Despite the focus on exotic zero-day exploits and sophisticated hacking techniques, IT teams are more concerned about more mundane risks to their organizations, such as risky employee behavior and cloud security.
Barracuda Networks has rebranded its eSignature product SignNow to CudaSign, and will offer the solution at just $1per user per month.
Network security firm Palo Alto Networks (NYSE: PANW) announced that total revenue for the fiscal second quarter ended January 31, 2015 grew 54 percent year-over-year to a record $217.7 million
Lookingglass Cyber Solutions, an Arlington, VA-based provider of threat intelligence solutions, announced on Monday that it has acquired Deep Packet Processing (DPP) platform provider CloudShield, for an undisclosed amount.
Cloud-based security solutions provider Proofpoint has agreed to acquire threat intelligence provider Emerging Threats, for roughly $40 million in cash and stock.
Attackers are using Windows Management Instrumentation (WMI) and PowerShell to avoid detection and carry out broad commands on compromised systems, according to FireEye-owned Mandiant.

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Marcus Ranum's picture
With security data, you will almost never benefit from using a pie chart instead of a time/value chart, unless you only have a single instance of data.
Travis Greene's picture
It’s time for targeted complexity that balances the convenience that users demand with the security that organizations need. It’s a bit like teaching a new dog old tricks.
Jason Polancich's picture
Most businesses today are not as secure as they could be due to an inaccurate view of their own cyberdefenses.
Jon-Louis Heimerl's picture
While you may have the greatest advantage if you know your enemy well, you are in the greatest peril if you do not know yourself well.
Rebecca Lawson's picture
As companies deploy new security technologies, understanding the impact on overall network performance should be a very important factor in the decision-making process.
Joshua Goldfarb's picture
Most enterprises collect huge quantities of data that result in shorter retention periods and longer query times. This perfect storm of circumstances creates a very real operational challenge.
Scott Simkin's picture
It doesn’t take the most advanced tools to break into the the largest corporations on the planet. Between user behavior and the types of malicious files attempting to compromise enterprises, there are a few steps you can take to reduce your risk exposure.
Pat Calhoun's picture
As enterprises continue to expand their arsenal of security products in an effort to strengthen protections against advanced threats, they often introduce complexity.
Torsten George's picture
Massive data breaches are raising doubts about whether organizations are investing their security dollars in the right areas.
David Holmes's picture
Many of the hardware RNGs within the load balancers can be tapped to provide real, hardware-based entropy for dozens, hundreds, or even thousands of machines within that data center.