Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

The assets of numerous organizations are at risk because their former employees continue to have access to sensitive corporate applications even after they leave the company.
Kaseya plans to add identity management as a service to its offerings, and views the acquisition as an important step.
Private equity investment firm Thoma Bravo announced on Wednesday that it would take a significant equity investment in SailPoint, a provider of identity and access management (IAM) solutions.
According to Damballa, there is no correlation between the size of an organization and the proportion of machines infected with malware.
The use of virtualized systems in a enterprise environments can provide many benefits, but these systems need some special attention paid to security, Symantec said in a new report examining threats to virtual environments.
Taiwan's science and technology minister said Wednesday that China is launching frequent cyber attacks on the island despite warming ties between the two former rivals.
Amazon is giving customers the option of an an extra layer of protection to their WorkSpaces virtual desktops by enabling a new two-factor authentication (2FA) feature.
Splunk has introduced a new application that's designed to help enterprises capture real-time streaming wire data.
IBM has made another move to expand and enhance its Identity and Access Management (IAM) offerings, announcing that it has acquired the business operations of cloud-based IAM vendor Lighthouse Security Group.
European security firm Gemalto has agreed to buy data protection firm SafeNet for $890 million in cash.

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Marc Solomon's picture
To help cybersecurity professionals cut through the hype and gain a better understanding of what to expect as the Internet of Everything continues to evolve, these top 10 observations might help.
Joshua Goldfarb's picture
An organization that keeps records of its security incidents should be able to study that data to understand the top ways in which it is generally becoming compromised.
Jason Polancich's picture
In order to make our ecosystem a safer place for all of us, small and large, the big guys out there are going to have to start - at least in part - handling the security of their small business partners, suppliers and customers.
Rebecca Lawson's picture
As enterprises made trade-offs in security; either sacrifice performance in order to add more layers of security beyond the traditional stateful firewall or don’t implement the new protections necessary to protect against many of the latest threats.
Danelle Au's picture
As the era of Internet of Things dawns, the amount of data and other cloud applications developed for unique industries will increase and bring a new era of privacy and security concerns.
Adam Ely's picture
Security teams and lines of business have reached a turning point on BYOD. It’s now become more important than ever for the CISO to figure out how to manage risk without inhibiting users.
Torsten George's picture
While the initial investment in a proof of concept can be costly, the end results might not only justify the additional expenses, but in the long-term save you money (and your job).
Joshua Goldfarb's picture
Not all security technologies are alert driven, but for those that are, there is huge potential value in turning off the default rule set
Marc Solomon's picture
With the right approach to security you can protect your organization’s sensitive information from both insiders and outsiders.
Jason Polancich's picture
Studying a problem from every angle and every level always leads to more practical solutions and quicker (re)action.