Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Cryptzone, a Waltham, Mass-based provider of application and content security solutions, has closed a $15 million Series B round of funding.
While container adoption is likely to surge over the next few years, concerns around security, certification and adequate skills remain, according to a recent survey commissioned by Red Hat.
Wikipedia will use HTTPS for all traffic to ensure users' safety and privacy. The transition will be completed within two weeks, says the Wikimedia Foundation.
US technology companies are getting hit harder than anticipated by revelations about surveillance programs led by the National Security Agency, a study showed Tuesday.
Security startup Menlo Security emerged from stealth armed with $25 million in funding from the closing of a Series B funding round.
NIST has released an updated version of its industrial control systems (ICS) cyber security guide. Vulnerabilities, risk management, best practices, security architectures, and tools sections updated.
Visa and FireEye announced plans to co-develop tools and services to help merchants and issuers protect against advanced cyber attacks targeting payment data.
By deploying Adallom with Dropbox for Business, customers will gain visibility into and control over company data shared and stored within Dropbox.
Centrify has made enhancements in the areas of secure user provisioning, license management, single sign on (SSO) and mobile device management for Office 365 (O365).
Cyphort, a provider of threat detection solutions, has secured $30 million in Series C funding, bringing the total raised by the company to more than $53 million.

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Scott Simkin's picture
In the moments after a breach, security teams will often focus on the event itself, but not draw additional insight from the attack, or analyze the events surrounding it.
Joshua Goldfarb's picture
When moving to the cloud, companies must understand the implications, enumerate the risks, and mitigate those risks accordingly.
Alan Cohen's picture
Today’s network perimeter is increasingly not a single physical or virtual place, yet much of the industry debate is still focused on the perimeter.
Wade Williamson's picture
In light of the seemingly endless parade of high-profile breaches, it’s easy to focus on external threats, while losing sight of insider threats.
Rebecca Lawson's picture
Although technology products are time and time again heavily relied on and placed at the forefront of defense, there is another critical element that needs just as much focus: training the next generation of technology professionals.
Alan Cohen's picture
Just as enterprise computing is having a DevOps moment, much of the security profession has woken up to the fact they are mired in the traditional infrastructure and silo approach.
Marc Solomon's picture
Just as the graduating class of 2015 will evolve how they operate to realize their full potential in the real world, we must evolve our approach to security in the Digital Economy.
Jason Polancich's picture
Without a solid base in knowing who you are as a target and what’s going on around you at all times, everything else you do is essentially a half-measure.
David Holmes's picture
DDoS continues to wax and wane in unpredictable cycles, but the ecosystem has evolved to keep it out of the mobile space.
Travis Greene's picture
No IT organization has a seemingly unlimited budget the way that Team Oracle did in the 2013 America’s Cup race. But look closer at why spending on America’s Cup racing seems so out of control and it starts to look a bit more familiar.