Security Experts:

Security Infrastructure
long dotted


Symantec and Blue Coat Systems have entered into a definitive agreement under which Symantec will acquire Blue Coat for roughly $4.65 billion in cash. [Read More]
Singapore's prime Minister Lee Hsien Loong has defended the country's controversial decision to cut off civil servants' work computers from the Internet [Read More]
VMware has patched a critical information disclosure vulnerability in its NSX and vCNS products [Read More]
A DoS vulnerability related to IPv6 processing has been found to affect both Cisco and Juniper Networks products [Read More]
Banking giant Morgan Stanley will pay $1 million as penalty for failure to protect customer information on roughly 730,000 clients, the Securities and exchange Commission (SEC) said Wednesday. [Read More]
RansomWeb attacks are on the rise and attackers have plenty of vulnerabilities they can exploit to hack website databases [Read More]
Researchers find several SQL injection vulnerabilities in the websites of the European Parliament and the European Commission [Read More]
Singapore confirmed it would cut off Internet access for government work stations within a year for security reasons, a surprise move in one of the world's most wired countries. [Read More]
Dominated by an overall increase in the number of distributed denial of service (DDoS) attacks, the first quarter of 2016 also saw a record number of attacks larger than 100 Gbps, a report from Akamai reveals. [Read More]
Egnyte Protect provides access control and can be used to eliminate insecure links, unify permissions across content repositories, and to locate unusual access patterns to help locate and limit data leakage. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Travis Greene's picture
Like all security measures, MFA is not an instant fix to safeguard credentials. But, understanding the risks of MFA limitations is the first step towards mitigation.
Johnnie Konstantas's picture
When I decided to write a piece on metadata, my first thought was: How can I make this short and sweet, like metadata? My next thought: A haiku!
Adam Meyer's picture
Many folks have distorted and confused the term Threat Intelligence, so much so that it’s meaning varies widely depending with whom you’re speaking. And that fact is taking away from the real value of legitimate cyber threat intelligence.
Alan Cohen's picture
If security can increasingly be distributed into the compute layer—effectively a form of self-protection—we begin to shift the playing field from attacker to defenders.
Adam Meyer's picture
All three types of intelligence help drive decisions and ultimately outcomes, but at different levels within the business.
Travis Greene's picture
Passwords really are that bad, and we now have another mandate to address this ongoing issue, or, the so-called elephant in the room: The growing push for multi-factor authentication.
Ken McAlpine's picture
The emergence of IoT may finally be the technology that brings security from a network afterthought and bolt-on technology to an integral, persistent, omnipresent part of the network.
Avi Chesla's picture
Security technologies must be provisioned with the right policy in order to ensure it complements the neighboring solution, and must also be activated in the right sequence.
Shlomo Kramer's picture
When it comes to deciding why you should re-evaluate security vendors, the solution’s roadmap is of strategic importance because it may require technical analysis and rethinking of the overall network security architecture.
Alan Cohen's picture
By utilizing security technologies that are “invisible” to the infrastructure, you can reduce, rather than add to, IT and security’s burdens.