Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Microsoft has acquired Israeli cyber security startup Aorato, a company focused on protecting Active Directory deployments.
Hackers believed to have been working from China broke through defenses of the US weather service recently, according to a report.
A study commissioned by Incapsula shows that the cost of a successful DDoS attack is estimated at $40,000 per hour.
Attackers are increasingly leveraging large Domain Name System (DNS) TXT records in an effort to amplify the impact of their distributed denial-of-service (DDoS) attacks.
Trend Micro announced the availability of its cloud and data center platform, Deep Security, for Amazon Web Services (AWS) on AWS Marketplace.
Researchers from security firm ESET have analyzed a malicious tool used by a notorious cyber espionage group to steal valuable information from air-gapped networks.
Version of the 5.1 of Microsoft's Enhanced Mitigation Experience Toolkit (EMET) brings improved protection and addresses several application compatibility issues.
Invision Power Services (IPS) has released patches to address an SQL injection vulnerability affecting versions 3.3.x and 3.4.x of the popular online forum software IP.Board.
Marco Vaz of Integrity Labs discovered a buffer overflow flaw in Belkin N750 DB Wi-Fi Dual-Band N+ Gigabit routers that can be exploited by a remote, unauthenticated attacker to gain root access to the device.
Cisco revealed that four of its small business RV series routers are affected by multiple vulnerabilities that can be exploited by malicious actors for various purposes.

FEATURES, INSIGHTS // Security Infrastructure

rss icon

James McFarlin's picture
Whether Adm. Michael Rogers can capitalize on opportunities to pull together the teamwork necessary to shore up America’s cybersecurity is a game just begun.
David Holmes's picture
In 2011, Twitter began encrypting all information between the (mostly) mobile endpoints and their own servers. This made it more difficult for monitoring agencies to determine a mobile user’s Twitter profile, and thereby that user’s follow list. More difficult, but not impossible.
David Maman's picture
Database Activity Monitoring (DAM) is a crucial part of your compliance and safety profile, but to be effective at protecting your database, you need to understand its limitations.
Danelle Au's picture
Cloud adoption should be a collaborative rather than prescriptive process between employees and IT. With the right mindset and strategy, what employees want and what IT wants can become a proper union in a Venn diagram.
Jason Polancich's picture
Your employees, partners, customers and suppliers are your “survival group” battle-buddies now and it’s important to know how the zombies behave and where they hide.
Travis Greene's picture
IAM is sometimes forgotten in the discussion of controls. However, it’s best to have these conversations when planning and evaluating controls, rather than after a breach.
Scott Simkin's picture
The network edge is the ideal location for quickly preventing the vast majority of attacks, but looking forward, you should consider how pervasive deployments can stop the new breed of advanced attack.
Marc Solomon's picture
Advancing our security controls isn’t going to happen overnight. But we are well on our way with technology and capabilities that are already headed in this direction, implementing dynamic controls to see more, learn more, and adapt quickly.
Rebecca Lawson's picture
There is a widening gap between detection of a threat and enforcement that causes the threat to stop at the firewall, rather than play out its malicious intent.
Mark Hatton's picture
Software and hardware alone are not enough to manage a massive enterprise security program. You need security professionals and experienced leaders who can keep the team (and the tools) operating effectively.
view counter