Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Enterprise technology provider CA Technologies has signed a definitive agreement to acquire privileged identity management solutions provider Xceedium for an undisclosed sum.
According to the results of a recent survey of 1,071 IT and IT security practitioners, most respondents said that more security incidents are caused by unintentional mistakes rather than intentional and/or malicious acts.
Facebook’s new Security Checkup tool for desktop is now available globally. Mobile version coming soon.
Sharing details of the breach would help other organizations identify if they have also been targeted by this group, security experts said.
Cylance has raised $42 million, which will be used to accelerate sales and marketing, and help support business expansion globally.
AlienVault, a provider of security management tools and threat intelligence solutions, has launched an updated version of its Open Threat Exchange (OTX).
Gigamon launched its GigaSECURE platform that was designed to give enterprises extensive visibility into network traffic, users, applications and suspicious activity.
Microsoft said on Wednesday that its new Advanced Threat Analytics (ATA) solution will be available for general release next month.
UK-based Darktrace, a cybersecurity startup that leverages machine learning and mathematics to detect threats, has raised $22.5 million in Series B funding from investment firm Summit Partners.
RSA has made improvements to the ECAT threat detection and remediation tool, and the Via Lifecycle and Governance identity management solution.

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Jason Polancich's picture
In today’s cyber defense world as in other business domains, actions should speak louder than words. Yet, too often, being “actionable” is just that - a word with no meaning.
Travis Greene's picture
Does it really matter if someone steals your healthcare records? What would a hacker do with that information? Sell it? To whom and for what purpose?
Alan Cohen's picture
Like other forms of technical debt, security debt must be paid down, which ultimately leads to a more agile and secure enterprise.
Danelle Au's picture
If your organization is not equipped to deal with the security of Emergent IT, it is probably not equipped to deal with the security of mainstream applications sanctioned by IT.
Wade Williamson's picture
While malware is obviously a critically important tool in the attacker’s arsenal, it is just one of many that make sophisticated attacks successful.
David Holmes's picture
Whether Shodan's John Matherly intends it to or not, Shodan is already exposing the sham of consumer-grade security that we all suspected would be a hallmark of The Internet of Things.
Rafal Los's picture
Often times it’s the insiders that enable the external attacker – either willingly or otherwise, and the result can be even more devastating than that of an external attacker.
Travis Greene's picture
Can IT security find a way to coexist with wearables faster than the first BYOD war and avoid a second war?
Scott Simkin's picture
In the moments after a breach, security teams will often focus on the event itself, but not draw additional insight from the attack, or analyze the events surrounding it.
Joshua Goldfarb's picture
When moving to the cloud, companies must understand the implications, enumerate the risks, and mitigate those risks accordingly.