Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Password management firm Dashlane has published a list of the top ten password offenders for 2017. [Read More]
Honeywell study shows many industrial companies are slow to secure their data and operations against cyber threats [Read More]
Mailsploit vulnerabilities allow email spoofing and code injection attacks against over 30 email apps [Read More]
Israel-based anti-phishing firm IRONSCALES raises $6.5 million. Money will be used to expand sales and expedite R&D for its technologies [Read More]
The most common infiltration and exfiltration methods used by attackers are successful much of the time, according to SafeBreach’s latest Hacker’s Playbook report [Read More]
UK member of parliament (MP) Nadine Dorries has declared on Twitter that she shares the password to her work computer with staff 'including interns'. [Read More]
ICS-CERT provides solid advice on updating antiviruses in industrial control systems, but it’s not practical and organizations should not believe AVs are enough [Read More]
PayPal suspends operations of its subsidiary TIO Networks after the discovery of a data breach that affects 1.6 million customers [Read More]
Three U.S. senators have introduced the Data Security and Breach Notification Act which would require companies to notify customers affected by a data breach within 30 days. [Read More]
Amazon Web Services (AWS) announces launch of new threat detection, IoT security, and VPC secure connectivity services [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

John Maddison's picture
Cybercriminals have begun to leverage automation and machine learning in their attack tactics, techniques, and procedures (TTP).
Justin Fier's picture
Organizations still using the legacy approaches from a year ago to five years ago are consistently outpaced and forced to play catch-up.
Travis Greene's picture
There are serious challenges to enabling true hybrid choice, covering mainframe, distributed, virtual, private and public cloud environments.
Marc Solomon's picture
It is important to have a prioritized list of vulnerabilities based on the threats to your organization; this list will be different for each company based on their environment and risk profile.
Scott Simkin's picture
A machine learning system needs to be trained, and it cannot be trained without a large amount of previous data and intelligence.
Lance Cottrell's picture
Passive Information Leakage (PIL) is one of the least known and most difficult forms of data lost to prevent, and is little understood, primarily because it cannot be addressed through conventional security practices.
Joshua Goldfarb's picture
Security teams have given up on building their workflow around a small number of “silver bullets” that claim to solve most of their problems
Dan Cornell's picture
As you start to get an idea of what your application portfolio looks like, you then need to start determining the specific risks that applications can expose your organization to.
Josh Lefkowitz's picture
It’s crucial to recognize that 2018 will very likely be yet another year of increasingly complex and damaging threats and incidents, which is why we must always build upon and further enhance our intelligence strategies.
Steven Grossman's picture
The challenge of data protection is not going away. Even without the ever-improving tactics of the bad guys, data sprawl has made it difficult for those just trying to do their jobs.