Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

PFP Cybersecurity, a Washington, D.C.-based cybersecurity startup, is taking a unique approach to detecting malware and threats within the IT supply chain as well as critical infrastructure such as industrial control systems.
Organizations are increasing investment in IT security, but aren't thinking beyond perimeter-based defenses, according to the latest Ponemon Institute survey.
Elites at the World Economic Forum in Davos were warned Saturday of the terrifying possibilities of modern cyber terrorism.
Security alerts can be highly useful in protecting an organization against a data breach, but inefficient alert management can have serious consequences, a new report shows.
Huawei CEO Ren Zhengfei said at the World Economic Forum that China has never asked it to spy on the United States or others.
Application networking solutions provider A10 Networks unveiled on Tuesday a new version of the Advanced Core Operating System (ACOS) platform, which powers many of the company’s products.
The gulf between reality and perception is widening, according to Cisco’s annual survey of CISOs and security executives.
IBM launched its z13 mainframe, what it says is one of the most sophisticated computer systems ever built, designed to deliver massive scalability together with real-time encryption and analytics to help support the demands of the mobile economy.
A survey from the Cloud Security Alliance found that IT managers and executives still have some trepidation about the security of data in the cloud.
Analysis of the Naenara Browser, a version of Mozilla Firefox modified by North Korea and bundled into Red Star OS, shows the DPRK may be funneling all traffic through one—or a handful—of public IP addresses.

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Marc Solomon's picture
“Slow and Low” isn’t just a popular song by the Beastie Boys. It’s also the tempo that adversaries are now choosing to launch attacks and evade detection.
Fahmida Y. Rashid's picture
Piper Jaffray's fourth annual CIO survey found that 75 percent of CIOs were expecting to increase their security spending in 2015. But are these security investments spent and utilized wisely?
Travis Greene's picture
When it comes to protecting against insider threat, there can be an over-reliance on policy and automated enforcement. Access Governance is a powerful tool to reduce the insider threat, but it needs to mature to the point where it is more responsive and more automated before relying on it completely.
Joshua Goldfarb's picture
The past few decades in the information security field have been dominated by passive failure. Clearly, not every new idea has merit, but those ideas that come about scientifically and methodically have tremendous potential to improve the state of security.
Rebecca Lawson's picture
As we enter the New Year, it’s time to reflect on these latest occurrences and consider what they may lead to in the year that lies ahead.
Nate Kube's picture
There are interesting lessons learned from IT IPS experiences that OT can benefit from. The first is to understand how attackers have bypassed traditional IPS IT solutions.
Scott Gainey's picture
Several financial analyst firms concluded extensive studies, surveying over a thousand CIOs and CSOs cumulatively, to gain a better understanding of how these breaches are impacting spending behaviors.
Danelle Au's picture
A data breach plan lays out the key steps and the key personnel to involve when a data breach happens, and needs to incorporate three elements.
Marc Solomon's picture
The threat landscape is ever evolving and always advancing with tailor-made, stealthy threats that evade traditional, point-in-time security defenses.
Travis Greene's picture
The combination of access governance and self-service access request and approval provides the best approach to strike back at the access clones.