Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Microsoft releases security advisory on how users can protect themselves against attacks leveraging DDE [Read More]
Intrusion detection system (IDS) signatures can be used as an evasion technique to bypass the IDS itself, thus serving as an attacker’s tools, a security researcher claims. [Read More]
Hundreds of apps that use Twilio SDK or REST API include hardcoded credentials that can be used to access millions of calls and text messages [Read More]
DevOps is increasing the attack surface in at least one area -- privileged accounts. [Read More]
Amazon adds five new encryption and security features to its S3 service, including one that alerts users of publicly accessible buckets [Read More]
The recently disclosed crypto flaw affecting Infineon chips takes less time to exploit than initially believed [Read More]
When an organization doesn't implement the very basic processes for security and management around privileged accounts, they are exposing themselves to significant risk. [Read More]
The United States Department of Homeland Security’s US-CERT has issued an alert to warn on cryptographic weaknesses impacting the IEEE P1735 standard. [Read More]
Avira launches SafeThings, a new solution designed to help ISPs and manufacturers build security into home routers [Read More]
NeuVector, a San Jose, Calif.-based developer of container security technology, has raised $7 million in Series A funding led by Hummer Winblad Venture Partners. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Marie Hattar's picture
Moving applications and content out to the edge of the network in cellular base stations is making some CSOs at large enterprises nervous.
Ashley Arbuckle's picture
If you’re among the majority taking an architectural approach to consolidate security vendors then remember, your best defense is a good offense.
Marc Solomon's picture
How do you determine the amount and mix of data that’s “just right” for your organization? To answer this question it helps to understand what’s driving the need for data in the first place.
Jennifer Blatnik's picture
You can slow down a hacker, but it will do you good to accept that you may never be able to truly stop someone from getting through your first line of defense.
Adam Meyer's picture
With sound cyber threat intelligence informing these plays in your book, you have practical methodologies to both proactively mitigate and more quickly and effectively respond to specific threats.
Alastair Paterson's picture
What can U.S.-based companies do to prepare for the GDPR that is due to come into force in May 2018? These five steps can help.
Oliver Rochford's picture
To succeed in an era of rapidly evolving threats and emerging technology and the resulting shortfall of actionable evidence and lack of certainty, hypothesizing is the closest we can get to prediction.
Siggi Stefnisson's picture
SSL encryption can create blind spots in many organizations, as malware in the HTTPS channel is essentially hidden from most web security tools.
Marc Solomon's picture
With the sheer volume of threat data continuing to climb at a staggering rate, security teams need to start with the threat – automating how we gather, score and prioritize threat intelligence.
Alan Cohen's picture
There are different types of segmentation architectures: network centric, hypervisor centers, or distributed. Let’s take a look at each one and review the puts and takes of each approach.