Security Experts:

Security Infrastructure
long dotted


Many home Internet routers are known to include vulnerabilities, while home users are not known for their ability to behave securely. [Read More]
Microsoft researchers release tool that helps security teams protect their networks by making it difficult for attackers to conduct reconnaissance [Read More]
A critical vulnerability patched by Cisco in one of its video conferencing products can be exploited by remote attackers to impersonate legitimate users [Read More]
Cybercriminals are exploiting a decade-old OpenSSH vulnerability to turn IoT devices into proxies and use them to route malicious traffic [Read More]
Amazon has prompted some of its customers to reset their passwords after learning that these might have been used to secure other online accounts as well. [Read More]
Mooltipass Mini is a hardware-based solution that helps consumers and enterprise users safely store and manage their passwords [Read More]
MITRE is offering $50,000 for a simple and affordable solution for detecting rogue IoT devices on a network [Read More]
Akamai confirmed that the Mirai botnet was part a recent massive DDoS attack, but also said that Mirai was only “a major participant in the attack” and that at least one other botnet might have been involved. [Read More]
NSA contractor Harold Martin, while working at Booz Allen Hamilton for the NSA, was arrested late August, accused of stealing secret documents. [Read More]
Yahoo on Wednesday denied conducting mass email surveillance after a report alleging it built a special scanning program at the behest of US intelligence which sparked an outcry from privacy activists. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Steven Grossman's picture
Beginning November 30, 2016, DoD third party contractors will be required to establish and maintain an insider threat program.
Marie Hattar's picture
Marie Hattar of Ixia looks at the growing armies of botnets, and how their tactics can be nullified using intelligent IP address filtering.
Lance Cottrell's picture
OODA loop is a well established concept often used in security which originated in the military. OODA stands for Observe, Orient, Decide, Act.
David Holmes's picture
Password proliferation is bad, for many, many, many reasons. But the worst reason is that people tend to re-use passwords all over the place.
Travis Greene's picture
Two-factor authentication (2FA) is becoming more mainstream for businesses; however, businesses need to consider how 2FA should be implemented to maintain both external and internal control.
Adam Meyer's picture
One key aspect of making threat intelligence practical is to ensure the intel is evaluated. What do I mean by this?
Erin O’Malley's picture
A security delivery platform delivers visibility into lateral movement of attackers, accelerates detection of data theft activity, and can reduce the overhead, complexity, and costs associated with security deployments.
Marie Hattar's picture
By following these best practice techniques, you can ensure that your security architecture maximizes your company’s overall security posture and its efficiency.
David Holmes's picture
SWEET32 is probably not something that an enterprise administrator needs to lose sleep over. Very likely, we will never see a SWEET32 attack in the wild, just as we never have for POODLE or BEAST.
Ken McAlpine's picture
Perhaps it’s time to look at Open Security as the next necessary iteration of deploying security technology.