Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Many organizations still haven't patched their installations of VMware to address the Heartbleed vulnerability, CloudPhysics reported.
UK Travel Company W3 Limited was fined £150,000 for violating the Data Protection Act after hackers stole details of 1.1 Million payment cards.
Information security specialists at the Georgia Tech Research Institute have developed BlackForest, a new open source intelligence gathering system.
The United States has failed to sufficiently adapt to new cyber-security threats, exposing itself to potential terror strikes as devastating as September 11, authors of the report on the 2001 attacks warned.
Comodo SecureBox is designed to help organizations protect the important applications running on their endpoints.
Many software development firms still fail to ensure that the components they use don't contain security vulnerabilities, according to a report published by software supply chain management company Sonatype.
Waterfall Security Solutions has teamed with energy management solutions maker Schneider Electric to offer Waterfall’s Unidirectional Security Gateways to Schneider’s customers.
LogRhythm has raised a $40 million round of new equity financing, the company announced.
The Splunk App for Enterprise Security 3.1 has introduced a new risk scoring framework to enable easier, faster threat detection and containment by empowering users to assign risk scores to any data.
Four recently-patched OpenSSL vulnerabilities have been found to affect several industrial products from Siemens.

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Joshua Goldfarb's picture
I am often asked the question: “Is security an unsolvable problem?” In order for me to answer that question, I would have to understand it, and I don’t.
Danelle Au's picture
Enterprises can gain tremendous competitive advantages by having IT focus on the things that matter – users and information rather than infrastructure maintenance and building.
Pat Calhoun's picture
The need for extreme network protection may be the driving force behind your decision to invest in a next-generation firewall (NGFW), but your enterprise also has other factors to consider.
Mark Hatton's picture
You need to identify your security shortcomings before someone else does. Simulate attacks and tests to associate known vulnerabilities, previous attack patterns, and security/network data to identify potential attack paths to your company’s most important data.
Marc Solomon's picture
To help cybersecurity professionals cut through the hype and gain a better understanding of what to expect as the Internet of Everything continues to evolve, these top 10 observations might help.
Joshua Goldfarb's picture
An organization that keeps records of its security incidents should be able to study that data to understand the top ways in which it is generally becoming compromised.
Jason Polancich's picture
In order to make our ecosystem a safer place for all of us, small and large, the big guys out there are going to have to start - at least in part - handling the security of their small business partners, suppliers and customers.
Rebecca Lawson's picture
As enterprises made trade-offs in security; either sacrifice performance in order to add more layers of security beyond the traditional stateful firewall or don’t implement the new protections necessary to protect against many of the latest threats.
Danelle Au's picture
As the era of Internet of Things dawns, the amount of data and other cloud applications developed for unique industries will increase and bring a new era of privacy and security concerns.
Adam Ely's picture
Security teams and lines of business have reached a turning point on BYOD. It’s now become more important than ever for the CISO to figure out how to manage risk without inhibiting users.