Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Network security firm Palo Alto Networks (NYSE: PANW) announced that total revenue for the fiscal second quarter ended January 31, 2015 grew 54 percent year-over-year to a record $217.7 million
Lookingglass Cyber Solutions, an Arlington, VA-based provider of threat intelligence solutions, announced on Monday that it has acquired Deep Packet Processing (DPP) platform provider CloudShield, for an undisclosed amount.
Cloud-based security solutions provider Proofpoint has agreed to acquire threat intelligence provider Emerging Threats, for roughly $40 million in cash and stock.
Attackers are using Windows Management Instrumentation (WMI) and PowerShell to avoid detection and carry out broad commands on compromised systems, according to FireEye-owned Mandiant.
Avast has launched a free, cloud-managed solution dedicated to small and medium businesses (SMBs) with limited budgets and resources.
Synack, a startup that has built a platform for crowdsourced security testing, announced on Thursday that it has raised $25 million in Series B funding co-led by GGV Capital and Icon Ventures.
Boards of directors may have authority over the business, but they may be among the last to know about the security risks facing their organization, according to a new survey from the Ponemon Institute.
Check Point Software Technologies has acquired Hyperwise, a privately held, security startup focused on CPU-level threat prevention technology.
A third of IT pros and administrators admitted downloading apps they were not authorized to and ignoring security policies and best practices in order to do their jobs, according to a new survey.
Japan's National Institute of Information and Communications Technology (NICT), which has a network of a quarter of a million sensors, said there were 25.66 billion attempts to compromise systems, according to a report.

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Avi Chesla's picture
When security technologies are bypassed, they cannot be “programmed” to detect and prevent the new attack behavior, the same attack that has breached their protection-space borders.  
David Holmes's picture
If Let’s Encrypt succeeds, will self-signed certificates go extinct? I’m guessing no, and that’s not necessarily a bad thing.
Pat Calhoun's picture
To evade network security defenses, Advanced evasion techniques (AETs) disguise malicious payloads by splitting them into smaller pieces and then delivering the pieces simultaneously, or at varying times, across multiple or rarely used network protocols.
Marcus Ranum's picture
With security data, you will almost never benefit from using a pie chart instead of a time/value chart, unless you only have a single instance of data.
Travis Greene's picture
It’s time for targeted complexity that balances the convenience that users demand with the security that organizations need. It’s a bit like teaching a new dog old tricks.
Jason Polancich's picture
Most businesses today are not as secure as they could be due to an inaccurate view of their own cyberdefenses.
Jon-Louis Heimerl's picture
While you may have the greatest advantage if you know your enemy well, you are in the greatest peril if you do not know yourself well.
Rebecca Lawson's picture
As companies deploy new security technologies, understanding the impact on overall network performance should be a very important factor in the decision-making process.
Joshua Goldfarb's picture
Most enterprises collect huge quantities of data that result in shorter retention periods and longer query times. This perfect storm of circumstances creates a very real operational challenge.
Scott Simkin's picture
It doesn’t take the most advanced tools to break into the the largest corporations on the planet. Between user behavior and the types of malicious files attempting to compromise enterprises, there are a few steps you can take to reduce your risk exposure.