Security Experts:

Security Infrastructure
long dotted


Organizations are increasingly aware about the risk of unprotected privileged accounts, but they still fail to enforce best practices [Read More]
A critical code execution vulnerability in an ASN.1 compiler exposes mobile devices and networks to remote attacks [Read More]
Hooking and injection vulnerabilities in security products allow attackers to bypass exploit mitigations and compromise systems [Read More]
Researcher demonstrates how hackers could have stolen money from Google, Microsoft and Facebook by leveraging flaws in phone verification services [Read More]
Two-thirds of European consumers want to use biometrics to make payments easier and more secure, according to research commissioned by Visa. [Read More]
Cisco and Juniper Networks release updates to patch high severity vulnerabilities in their operating systems [Read More]
New developments in machine learning (ML), artificial intelligence (AI), and cognitive computing (CC) can play an important role in cyber security. [Read More]
A new cyber espionage group called Dropping Elephant achieves a high success rate with only low tech attacks. [Read More]
A vulnerability disclosed in June that affected a Wi-Fi camera has been found to affect over 120 products from D-Link. [Read More]
Most businesses lack insight into the actual value of critical data assets that are targeted by cybercriminals, a recent report reveals. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Jim Ivers's picture
Hackers are human. Hopefully that doesn’t surprise you too much. Being human means that they are subject to human tendencies, like taking the path of least resistance.
Joshua Goldfarb's picture
The trust between those who run the security organization, and the analysts, incident responders, engineers, and others who do the work on a daily basis is extremely important.
Travis Greene's picture
Like all security measures, MFA is not an instant fix to safeguard credentials. But, understanding the risks of MFA limitations is the first step towards mitigation.
Johnnie Konstantas's picture
When I decided to write a piece on metadata, my first thought was: How can I make this short and sweet, like metadata? My next thought: A haiku!
Adam Meyer's picture
Many folks have distorted and confused the term Threat Intelligence, so much so that it’s meaning varies widely depending with whom you’re speaking. And that fact is taking away from the real value of legitimate cyber threat intelligence.
Alan Cohen's picture
If security can increasingly be distributed into the compute layer—effectively a form of self-protection—we begin to shift the playing field from attacker to defenders.
Adam Meyer's picture
All three types of intelligence help drive decisions and ultimately outcomes, but at different levels within the business.
Travis Greene's picture
Passwords really are that bad, and we now have another mandate to address this ongoing issue, or, the so-called elephant in the room: The growing push for multi-factor authentication.
Ken McAlpine's picture
The emergence of IoT may finally be the technology that brings security from a network afterthought and bolt-on technology to an integral, persistent, omnipresent part of the network.
Avi Chesla's picture
Security technologies must be provisioned with the right policy in order to ensure it complements the neighboring solution, and must also be activated in the right sequence.