Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Cisco patches critical remote code execution vulnerability found by the company in its industrial routers [Read More]
A new "brain-inspired" computer system promises improved detection of cyber threats by looking for specific patterns that can more efficiently reveal indicators of compromise in a network. [Read More]
Researchers discovered multiple serious vulnerabilities in popular solar park monitoring devices from Solar-Log [Read More]
Vulnerabilities found in the Chrome and Firefox extensions of the LastPass password manager allow attackers to steal passwords, execute code [Read More]
DoubleAgent is a new attack method that abuses a legitimate Microsoft tool to hijack security products [Read More]
Join F5 Networks and SecurityWeek for this interactive webinar to learn what good, actionable threat intelligence looks like, and how to effectively use it to neutralize potential attacks before they strike. [Read More]
High severity vulnerabilities in Cisco IOS allow attackers to cause a DoS condition by sending specially crafted packets [Read More]
Google painted a bleak picture of cybersecurity trends, saying the number of websites hacked rose 32 percent in 2016, with little relief in sight. [Read More]
A recently disclosed User Account Control (UAC) bypass that leverages App Paths can be used for fileless attacks as well, security researcher Matt Nelson now says. [Read More]
A vulnerable application used by millions of McDonald’s customers in India was recently found to leak personal information of its users. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Joshua Goldfarb's picture
Although attackers still use malicious code quite often, they have been relying less and less on it. So how do attackers manage to be so successful without using any malware at all?
Marc Solomon's picture
Companies can make their entire security infrastructure more effective by using this threat intelligence as the glue to integrate layers of point products within a defense-in-depth strategy.
Ken McAlpine's picture
To apply an effective intent-based network security strategy to networks, security teams need to rethink how they plan, design, organize, and implement network architecture.
Josh Lefkowitz's picture
Without automation, analysts spend more time digging and less time interpreting information as only humans can do, to produce true intelligence.
David Holmes's picture
Ladies and Gentlemen! Gamers and Cryptoheads! Have you ever wondered which major gaming console has the best message encryption? Well, I’m going to reveal the clear winner in my own recent personal test.
Ashley Arbuckle's picture
Generally referred to as the “attack chain,” the approach cybercriminals follow to launch and execute attacks is well-documented and includes reconnaissance, weaponization, delivery, and installation.
Travis Greene's picture
Shadow IT 2.0 is a symptom of a bigger problem – the inability to maintain digital competitive advantage due to the insufficient pace of code deployment.
Scott Simkin's picture
Attackers have developed anti-VM analysis techniques to allow the malware to recognize when it is being run on a virtual machine and fail to execute, meaning the system or threat analytics cannot make a verdict determination or extract intelligence from the sample.
Adam Meyer's picture
Cyber threat intelligence needs to be tailored to its audience as it means different things to different people, whether it’s on-the-network defenders, Red Teams, threat analysts, risk officers, business executives and Board of Directors, legal, application owners, and so on.
Jennifer Blatnik's picture
Focusing on securing an endless amount of endpoints is almost impossible to do effectively. You can’t rely on the devices to be secure and you can’t rely on the consumers to secure their devices themselves.