Security Experts:

Security Infrastructure
long dotted


Around 900,000 Deutsche Telekom customers using specific models of network routers have had Internet service disrupted by likely deliberate hacking, the company said Monday. [Read More]
Vulnerabilities in Microsoft’s Azure cloud platform could have been exploited to gain access to RHEL virtual machines and storage accounts [Read More]
A laptop containing the personal details of more than 130,000 sailors has been compromised, the U.S. Navy revealed [Read More]
Users can now check whether their network is exposed to Mirai, one of the most prolific botnets to have targeted Internet of Things (IoT) devices this year. [Read More]
Researchers have detected 57 Million Scans for a backdoor in Netis routers through the UDP port 53413. [Read More]
Starting on February 14, 2017, Microsoft’s Edge and Internet Explorer 11 web browsers will no longer load sites protected with a SHA-1 certificate. [Read More]
Several DoS vulnerabilities, including one rated high severity, have been patched in the Network Time Protocol (NTP) [Read More]
On average, an enterprise now uses 1,427 cloud services. Although enterprises are attempting to control their use of cloud apps, this has clearly not yet been achieved. [Read More]
Oracle announced it is buying Dyn, a Web traffic management firm recently hit with a cyber attack that closed off the internet to millions of users. [Read More]
Hackers attempted to extort Michigan State University after gaining access to a database containing 400,000 student and employee records [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

David Holmes's picture
What are the possible threat vectors if you were doing a threat model assessment for any of cloud passwords management models?
Marie Hattar's picture
Monitoring and securing modern network flows requires granular insight, only possible through sophisticated and automated analytics and security tools.
Eddie Garcia's picture
To reduce the chances of falling victim to an insider-driven breach, security and risk professionals should start by learning what their available data can tell them.
Marc Solomon's picture
Intelligence-driven security starts with changing how we collect and manage the millions of points of threat data that analysts are bombarded with every day.
Ashley Arbuckle's picture
By aligning your segmentation strategy to business objectives you can respond quickly to the needs of the business while reducing risk and protecting data and applications.
Lance Cottrell's picture
The old castle wall model of perimeter security is almost worthless and often leads to poorly designed architectures and strategies.
Ken McAlpine's picture
When looking to solve IoT security challenges, look for products that support a multi-vendor enforcement fabric to share, synchronize, and automatically respond to threats.
Scott Simkin's picture
In discussions about cybersecurity, a word that gets used a lot is “prevention.” How do you prevent cyberattacks before they succeed?
Aditya Sood's picture
The cloud is here to stay, and so long as employees use cloud apps from within an organization’s firewall, we’ll always have to wrangle with Shadow IT, Shadow Data and the attendant problems and risks.
Erin O’Malley's picture
Visibility—delivered via a centralized platform—is the only thing that is going to bring order to the kluge that is the modern-day network.