Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Cisco said on Tuesday that it would pay roughly $635 million to acquire San Francisco-based OpenDNS
Honeywell and Intel Security said will combine forces to boost protection of critical industrial infrastructure and the “Industrial Internet of Things” (IIoT).
Join this interactive webcast on June 30th at 1pm ET to learn best practices for managing and governing privileged identities in the modern enterprise.
Cisco warned on Thursday that as a result of default encryption keys in three of its security products, customers are at risk of an unauthenticated remote attacker being able intercept traffic or gain access to vulnerable systems with root privileges.
In an analysis of 660,000 pieces of information collected, Recorded Future found login credentials for 89 unique domains possibly belonging to government agencies.
Thirty-two percent of respondents who admitted experiencing a breach said they couldn't e
Cryptzone, a Waltham, Mass-based provider of application and content security solutions, has closed a $15 million Series B round of funding.
While container adoption is likely to surge over the next few years, concerns around security, certification and adequate skills remain, according to a recent survey commissioned by Red Hat.
Wikipedia will use HTTPS for all traffic to ensure users' safety and privacy. The transition will be completed within two weeks, says the Wikimedia Foundation.
US technology companies are getting hit harder than anticipated by revelations about surveillance programs led by the National Security Agency, a study showed Tuesday.

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Alan Cohen's picture
Today’s network perimeter is increasingly not a single physical or virtual place, yet much of the industry debate is still focused on the perimeter.
Wade Williamson's picture
In light of the seemingly endless parade of high-profile breaches, it’s easy to focus on external threats, while losing sight of insider threats.
Rebecca Lawson's picture
Although technology products are time and time again heavily relied on and placed at the forefront of defense, there is another critical element that needs just as much focus: training the next generation of technology professionals.
Alan Cohen's picture
Just as enterprise computing is having a DevOps moment, much of the security profession has woken up to the fact they are mired in the traditional infrastructure and silo approach.
Marc Solomon's picture
Just as the graduating class of 2015 will evolve how they operate to realize their full potential in the real world, we must evolve our approach to security in the Digital Economy.
Jason Polancich's picture
Without a solid base in knowing who you are as a target and what’s going on around you at all times, everything else you do is essentially a half-measure.
David Holmes's picture
DDoS continues to wax and wane in unpredictable cycles, but the ecosystem has evolved to keep it out of the mobile space.
Travis Greene's picture
No IT organization has a seemingly unlimited budget the way that Team Oracle did in the 2013 America’s Cup race. But look closer at why spending on America’s Cup racing seems so out of control and it starts to look a bit more familiar.
Nate Kube's picture
Manufacturing supply chains are vital to the development and fulfillment of any modern technology—they change rapidly and locations of suppliers change. This dynamic nature of the supply chain exposes enterprises to a wide variety of risks.
Wade Williamson's picture
While higher education certainly has some unique challenges, they are by no means alone in terms of facing breaches. Attackers who want to get into a network can typically afford to be patient.