Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

FireEye's Global Threat Intelligence Sharing initiative will allow customers to bi-directionally share threat intelligence in near real-time.
US President Barack Obama seeks to rally support for cybersecurity efforts and rebuild trust eroded by leaks on surveillance in a visit Friday to Silicon Valley.
Register for this webcast to learn how you can align, automate and enforce controls to security and compliance policies - while providing visualization, workflow and reporting critical to improving operational efficiency and reducing audit costs.
In an effort to contribute to making authentication more secure, a researcher has decided to publish 10 million username/password combinations that he has collected over the years from the Web.
HP has agreed to acquire Voltage Security, a provider of data security solutions, for an undisclosed sum.
Virtually all "connected cars" on the road are vulnerable to hackers who could steal data or gain control of the vehicle, a report from a US senator said Monday.
Qualys has improved its Web Application Scanning (WAS) solution with progressive scanning capabilities that reduce crawl times and impact.
Companies need to find a new approach to IT security if they want to be successful in today’s application economy, according to a new report from CA Technologies.
Please join us on Tuesday, Feb. 3rd at 1PM ET for a special webcast: How To Avoid Being Tomorrow's Headline: Mitigating Insider Threats and Breaches, presented by Centrify.
The US Army Research Laboratory (ARL) has released the source code for Dshell, a framework that can be used to analyze cyberattacks.

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Torsten George's picture
Massive data breaches are raising doubts about whether organizations are investing their security dollars in the right areas.
David Holmes's picture
Many of the hardware RNGs within the load balancers can be tapped to provide real, hardware-based entropy for dozens, hundreds, or even thousands of machines within that data center.
Marc Solomon's picture
“Slow and Low” isn’t just a popular song by the Beastie Boys. It’s also the tempo that adversaries are now choosing to launch attacks and evade detection.
Fahmida Y. Rashid's picture
Piper Jaffray's fourth annual CIO survey found that 75 percent of CIOs were expecting to increase their security spending in 2015. But are these security investments spent and utilized wisely?
Travis Greene's picture
When it comes to protecting against insider threat, there can be an over-reliance on policy and automated enforcement. Access Governance is a powerful tool to reduce the insider threat, but it needs to mature to the point where it is more responsive and more automated before relying on it completely.
Joshua Goldfarb's picture
The past few decades in the information security field have been dominated by passive failure. Clearly, not every new idea has merit, but those ideas that come about scientifically and methodically have tremendous potential to improve the state of security.
Rebecca Lawson's picture
As we enter the New Year, it’s time to reflect on these latest occurrences and consider what they may lead to in the year that lies ahead.
Nate Kube's picture
There are interesting lessons learned from IT IPS experiences that OT can benefit from. The first is to understand how attackers have bypassed traditional IPS IT solutions.
Scott Gainey's picture
Several financial analyst firms concluded extensive studies, surveying over a thousand CIOs and CSOs cumulatively, to gain a better understanding of how these breaches are impacting spending behaviors.
Danelle Au's picture
A data breach plan lays out the key steps and the key personnel to involve when a data breach happens, and needs to incorporate three elements.