Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Amazon is now offering free security certificates, but some experts say the use of free certificates poses risks that enterprises should be fully aware of. [Read More]
The U.S. House Oversight and Government Reform Committee has asked federal agencies about the use and patching of vulnerable Juniper Networks products [Read More]
The backdoor plaguing older versions of Fortinet’s FortiOS operating system has been found to affect other products as well [Read More]
Many countries leave their nuclear facilities exposed to cyberattacks, according to a report from the Nuclear Threat Initiative (NTI) [Read More]
Broadly shared files represent a high security risk for organizations, as 1 in 10 contain sensitive corporate data, Blue Coat’s Shadow Data Report for the second half of 2015 reveals. [Read More]
Unisys Corporation has made its Unisys Stealth micro-segmentation security solution available for Amazon Web Services (AWS) Cloud customers. [Read More]
Cisco this week announced Cloud Consumption as a Service, a new software-as-a-service product aimed at helping businesses address the increasing shadow IT challenge. [Read More]
The US Nuclear Regulatory Commission’s cybersecurity center is not optimized to protect the agency’s networks against cyberattacks, audit shows [Read More]
Cisco has released software updates to address critical and high severity vulnerabilities affecting some of the company’s networking and security products [Read More]
Shape Security has raised $25 Million in a Series D funding round to accelerate deployments of its Botwall Service, with specific plans to expand further in China. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Travis Greene's picture
To understand why return on Access Governance is lower versus other security technologies, we first need to understand why Access Governance is implemented in the first place.
Rafal Los's picture
How many devices are showing up at the office this week that are an always-on conduit to your network from some external third party you really shouldn’t be trusting?
Johnnie Konstantas's picture
Visibility into all inter-SDN traffic gives security and performance management technologies the best statistical chance of surfacing embedded malware and anomalous patterns.
Marc Solomon's picture
As security vendors, it is incumbent upon us to reduce complexity. By resolving to make advances in these three areas, we can reduce security complexity while helping more organizations thwart more attacks.
Alan Cohen's picture
Now that we are coming up on the second “year of the hack”—who said good things only come around once, right?
Jim Ivers's picture
Hackers are creative by nature, so you have to use your imagination to think like one. Once you can see your organization from a hacker’s point-of-view, you will be equipped to defend your organization like a security pro.
Alastair Paterson's picture
Expanding beyond generic threat intelligence to cyber situational awareness empowers organizations to make much more informed security decisions.
Alan Cohen's picture
It is both naïve and wrong to ignore the role infrastructure plays in protecting data. Trusted networks trump untrusted networks. However, should security be a reason to upgrade networks or stay with proprietary compute architectures?
Danelle Au's picture
Like Ebenezer Scrooge on that fateful Christmas Eve, you may vow to make the changes necessary to un-do the burden of a kill-chain forged in life and declare as Scrooge did the next morning.
Marc Solomon's picture
With increased awareness and a deeper understanding of how attackers go about their ‘shopping’ we can take some relatively simple baseline measures that can go a long way toward protecting against cybercrime this time of year.