Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Internet Corporation for Assigned Names and Numbers (ICANN) is on course to break free of US oversight late next year.
Several sophisticated threat groups have breached the systems of a major critical manufacturing company, the Department of Homeland Security (DHS) revealed in a report.
WordPress is the most attacked content management system (CMS), according to a report from Imperva. Analysis showed that WordPress websites were attacked 24.1% more than sites running on all other CMS platforms combined.
Wurldtech Security Technologies has launched a new network security solution built specifically to protect industrial and SCADA operations.
Researchers have uncovered several security holes in enterprise software solutions developed by German business software giant SAP.
The GNU Bash vulnerability dubbed ShellShock affects a wide range of software solutions, including some industrial products developed by the German engineering and electronics giant Siemens.
Data belonging to customer of MBIA Inc., the largest bond insurer in the United States, was inadvertently made available online due to a misconfigured Web server.
SSH Communications Security has launched a new governance, risk and compliance (GRC) service designed to help organizations with Secure Shell (SSH) key management in data center environments.
Threat protection firm FireEye has announced new targeted attack protection offering for Apple’s Mac OS X and iOS platforms.
The public-facing segments of federal civilian agency networks will be regularly and proactively scanned by the United States Department of Homeland Security (DHS) in an effort to speed up the response to cyber threats and vulnerabilities.

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Joshua Goldfarb's picture
Although it may be tempting to envision a world where the analyst has been fully automated, this does not seem particularly reasonable.
Pat Calhoun's picture
Being connected is critical and all the elements of an organization’s security platform should work in concert together to provide adaptive security for the entire environment.
Rebecca Lawson's picture
There is a common misconception that in order to move to virtual security solutions, companies can, or should, replace physical security technologies they rely on to keep their networks safe today.
Travis Greene's picture
If you can’t interpret user activity with the context of identity and what is normal behavior, your organization may be living with a false sense of security, providing a significant window of opportunity for attackers.
Danelle Au's picture
The recent iCloud attack brings up very important considerations on data security, not only for consumers, but for any enterprise that uses the cloud.
Jason Polancich's picture
Collecting just a small amount of info regularly and diligently for your supply chain can not only help you secure your back doors, but the front entrances too.
Scott Simkin's picture
Enterprises must tailor their security policy and protections to the actual threats they experience and to the threat landscape at large.
James McFarlin's picture
Creative disruption, where a paradigm shift in thinking replaces an existing order, may be an elusive concept but its power as a driving force of human behavior cannot be denied.
Marc Solomon's picture
With the right information, security professionals can quickly pivot from detection to a full understanding of the scope of the outbreak and take action to head off wider compromises
Travis Greene's picture
The significant breaches of today are executed by people infiltrating the organization, and attackers are doing this by assuming identities or abusing insider privileges.