Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

High severity denial-of-service (DoS) vulnerability patched in OpenSSL 1.1.0 with the release of version 1.1.0e [Read More]
Study conducted by Trend Micro shows the exposure of critical sectors and industrial systems in the United States [Read More]
IT analytics firm ExtraHop Networks today announced ExtraHop Addy, a cloud-based machine-learning wire data analytical tool that is being trained to automatically detect anomalies on the fly as they are happening. [Read More]
Microsoft delays February 2017 security updates due to a last minute issue that could not be resolved in time [Read More]
HPE launches threat investigation solution and data security product for IoT, big data and Hadoop [Read More]
ThreatConnect launches new suite of threat intelligence products that help companies understand adversaries and automate security operations [Read More]
An increasing number of custom apps are being moved into cloud infrastructures (primarily AWS, Azure and Google Cloud Platform) without the security team necessarily being aware that they exist. [Read More]
RSA improves several products and launches new services as it unveils its Business-Driven Security offering [Read More]
Microsoft unveiled several new security capabilities in Office 365, including Office 365 Secure Score, Threat Intelligence Private Preview, and Advanced Data Governance Preview. [Read More]
A new survey of American adults' perceptions of cybersecurity and hackers shows both a generational and a gender divide in attitudes. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Ashley Arbuckle's picture
The healthcare industry has a lot to gain by digital transformation. However it also has a lot to lose if it doesn’t start with security as a foundation.
Marc Solomon's picture
Analysts must work together and across the organization to provide the right intelligence in the right format and with the right frequency so that it can be used by multiple teams.
Lance Cottrell's picture
When properly integrated, detection, response, and prevention reinforce each other, each making the other more effective.
Travis Greene's picture
Whether US government officials improve their handling of classified information in the new administration or not, industry can certainty learn from the blunders and reduce risks.
Torsten George's picture
While machine learning can help reduce time-to-remediation, will it ever be able to autonomously protect organizations against cyber-attacks?
Avi Chesla's picture
Our cybersecurity ecosystem needs to be simplified – this is a fundamental challenge that the industry has avoided talking about. This need for simplification is what lies at the core of “Security Abstraction “
Joshua Goldfarb's picture
While sprinting from distraction to distraction may fool some people, it won’t fool nearly enough to justify the risk it introduces into your organization.
Alan Cohen's picture
Organizations of any size can do one important thing to help address this challenge: better segment their interior networks and data center operations.
Adam Meyer's picture
While organizations can’t really impact cybercriminals’ intent or capability, placing greater focus on reducing the bad guys’ opportunity - especially as the level of presence is growing - should be at the top of your security to-do list in 2017.
Ken McAlpine's picture
Dozens of isolated security tools and platforms, regardless of how relevant they are to new cloud-based networks, create their own problem.