Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Wurldtech Security Technologies has launched a new network security solution built specifically to protect industrial and SCADA operations.
Researchers have uncovered several security holes in enterprise software solutions developed by German business software giant SAP.
The GNU Bash vulnerability dubbed ShellShock affects a wide range of software solutions, including some industrial products developed by the German engineering and electronics giant Siemens.
Data belonging to customer of MBIA Inc., the largest bond insurer in the United States, was inadvertently made available online due to a misconfigured Web server.
SSH Communications Security has launched a new governance, risk and compliance (GRC) service designed to help organizations with Secure Shell (SSH) key management in data center environments.
Threat protection firm FireEye has announced new targeted attack protection offering for Apple’s Mac OS X and iOS platforms.
The public-facing segments of federal civilian agency networks will be regularly and proactively scanned by the United States Department of Homeland Security (DHS) in an effort to speed up the response to cyber threats and vulnerabilities.
NSS Labs said Palo Alto's next-generation firewall "misses several critical evasions that leave its customers at risk" if run with the default configuration as attackers would be able to bypass the firewall's detection capabilities.
The new research on ICS Cyber Security being conducted in the United Kingdom, thanks to an investment of £2.5 million (roughly $4 million) from various UK organizations.
The open source virtual private network solution OpenVPN is reportedly affected by the notorious GNU Bash vulnerability dubbed ShellShock, a researcher revealed on Tuesday.

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Rebecca Lawson's picture
There is a common misconception that in order to move to virtual security solutions, companies can, or should, replace physical security technologies they rely on to keep their networks safe today.
Travis Greene's picture
If you can’t interpret user activity with the context of identity and what is normal behavior, your organization may be living with a false sense of security, providing a significant window of opportunity for attackers.
Danelle Au's picture
The recent iCloud attack brings up very important considerations on data security, not only for consumers, but for any enterprise that uses the cloud.
Jason Polancich's picture
Collecting just a small amount of info regularly and diligently for your supply chain can not only help you secure your back doors, but the front entrances too.
Scott Simkin's picture
Enterprises must tailor their security policy and protections to the actual threats they experience and to the threat landscape at large.
James McFarlin's picture
Creative disruption, where a paradigm shift in thinking replaces an existing order, may be an elusive concept but its power as a driving force of human behavior cannot be denied.
Marc Solomon's picture
With the right information, security professionals can quickly pivot from detection to a full understanding of the scope of the outbreak and take action to head off wider compromises
Travis Greene's picture
The significant breaches of today are executed by people infiltrating the organization, and attackers are doing this by assuming identities or abusing insider privileges.
Danelle Au's picture
Cloud service providers play a key role in delivering security, but as part of the shared responsibility model, they are not liable for access to and usage of the cloud application.
Pat Calhoun's picture
With a community of nearly 400,000 registered users, Snort remains a valuable tool for security organizations and has certainly flexed its muscles, but it may need some reinforcements to maintain its security longevity.