Security Experts:

Security Infrastructure
long dotted


Illusive Networks has announced SWIFT Guard, described by the company as cyber deception technology designed to protect SWIFT-connected banks from cyber criminals. [Read More]
Please join Centrify and SecurityWeek for a live webinar where will discuss guidance from the National Institute of Standards and Technology (NIST) along with best practices and regulation mandates. [Read More]
The ultimate goal for many of IoT-focused malware is to build strong botnets in order to launch distributed denial of service (DDoS) attacks, Symantec researchers warn. [Read More]
In a recent survey, confidence in a successful Disaster Recovery (DR) failover was only substantiated in 38% of cases, as fifty-eight percent of respondents experienced issues during a failover. [Read More]
Researchers have demonstrated how hackers can access an organization’s internal network by leveraging vulnerabilities in Kerio Control firewalls [Read More]
A new survey suggests that while security awareness is improving, security preparedness is not keeping pace. [Read More]
A new OAuth 2.0 token revocation rule will soon cause third-party mail apps to stop syncing data upon user password change, Google revealed. [Read More]
More than a dozen vulnerabilities have been patched in OpenSSL with the release of versions 1.1.0a, 1.0.2i and 1.0.1u [Read More]
A couple of critical and high severity vulnerabilities affecting Cisco’s Cloud Services Platform can be exploited by remote attackers for arbitrary command execution [Read More]
According to an analysis of more than 20,000 cloud services, only 6% can claim to be fully compliant with the European Union's General Data Protection Regulation (GDPR). [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

David Holmes's picture
SWEET32 is probably not something that an enterprise administrator needs to lose sleep over. Very likely, we will never see a SWEET32 attack in the wild, just as we never have for POODLE or BEAST.
Ken McAlpine's picture
Perhaps it’s time to look at Open Security as the next necessary iteration of deploying security technology.
Wade Williamson's picture
A data center will often encounter an attacker at a far more mature phase of attack than the perimeter will, and likewise, will experience different types of threats and attack techniques.
Adam Meyer's picture
Cyber threat intelligence isn’t just another tool or layer of protection for your organization. It’s a capability that drives more effective cybersecurity decisions and more investment.
David Holmes's picture
SSL/TLS-encrypted traffic has become so common today that the attack communication with bots now goes undetected by these security solutions.
Travis Greene's picture
As the demand for identity governance in Asian companies grows, the key differentiator is that it’s going to come from a need to reduce risk.
Scott Simkin's picture
Cybersecurity needs to build bridges between the security operations (SecOps), network operations (NetOps) and physical security teams to be successful.
Ashley Arbuckle's picture
Managed Detection and Response (MDR) services differ from traditional managed security services in three ways: speed, accuracy, and focus. Here’s how.
Eddie Garcia's picture
This article explains how to encrypt data in a Hadoop cluster. The tools are available, and if you are brave enough, you could attempt this at home.
Erin O’Malley's picture
To understand SIEM, it’s important to first understand when people started to care about network security. And to do that, we need to take a step back in time.