Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

The US Department of Homeland Security's US-CERT has issued a new alert warning about problems with some HTTPS inspection products. [Read More]
White hat hackers earned tens of thousands of dollars for finding critical vulnerabilities in GitHub Enterprise [Read More]
Distributed denial of service (DDoS) attacks continue to grow in size and sophistication, with network layer attacks reaching record levels in the fourth quarter of 2016, Imperva reports. [Read More]
An unpatched command injection vulnerability affecting many Ubiquiti products allows attackers to hack devices [Read More]
With billions of stolen login credentials available on the dark web, bad bots are busy testing them against websites all over the globe. [Read More]
On day one of Pwn2Own 2017, participants hacked Microsoft Edge, Safari, Ubuntu and Adobe Reader [Read More]
Vulnerability in the web versions of WhatsApp and Telegram allowed hackers to hijack accounts by sending a malicious file to the targeted user [Read More]
Turkish hackers abuse Twitter Counter app to hijack many high-profile Twitter accounts over the diplomatic dispute between Turkey and the Netherlands [Read More]
Financially motivated attackers have become just as sophisticated as state-sponsored actors, says FireEye in 2017 M-Trends report [Read More]
Cybercriminals have been stealing payment card data from Magento stores by hijacking a payments extension [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Marc Solomon's picture
Threat intelligence has a shelf life, but there’s not a well-defined, industry standard on how to expire threat intelligence.
Marie Hattar's picture
To fully realize the benefit of the Public Cloud, it is vital that the same due diligence applied to a physical network is applied to a cloud-based infrastructure.
Alan Cohen's picture
While there are clear security benefits gained through network segmentation, the principal goal of creating subnets is to improve performance, avoiding broadcast storms and latency stimulated by our insatiable requirement for bandwidth.
Jim Ivers's picture
Savvy organizations have learned how to use a mix of static and dynamic application security testing types to increase their coverage and lower their risk.
Rafal Los's picture
Do you ever find yourself trying to protect your organization from exotic attack scenarios that are highly unlikely or that would have a minimal impact on you?
Ashley Arbuckle's picture
The healthcare industry has a lot to gain by digital transformation. However it also has a lot to lose if it doesn’t start with security as a foundation.
Marc Solomon's picture
Analysts must work together and across the organization to provide the right intelligence in the right format and with the right frequency so that it can be used by multiple teams.
Lance Cottrell's picture
When properly integrated, detection, response, and prevention reinforce each other, each making the other more effective.
Travis Greene's picture
Whether US government officials improve their handling of classified information in the new administration or not, industry can certainty learn from the blunders and reduce risks.
Torsten George's picture
While machine learning can help reduce time-to-remediation, will it ever be able to autonomously protect organizations against cyber-attacks?