Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Silicon Valley SOC startup Anvilogic has deposited $25 million in a new investment round led by Outpost Ventures. [Read More]
Apple's security response team has pushed out software fixes for at least 39 software vulnerabilities haunting the macOS Catalina, iOS and iPadOS platforms. [Read More]
MDR platform provider Huntress has shelled out $22 million to acquire Curricula, a startup in the growing security awareness business. [Read More]
Zero trust is on track to being implemented in many OT environments, particularly in critical infrastructure organizations. [Read More]
Redmond's Salus tool works across platforms including Windows, Linux, and Mac to generate SBOMs based on the SPDX specification. [Read More]
Microsoft issues an urgent Patch Tuesday bulletin to warn of in-the-wild zero-day exploitation of a privilege escalation flaw in the Windows operating system. [Read More]
The open source group rates this a "high-severity" issue and urged users to upgrade to OpenSSL 3.0.5. [Read More]
Researchers at ReversingLabs and Checkmarx release separate warnings about software supply chain attacks targeting the open source NPM ecosystem. [Read More]
AI in cybersecurity has value, but there is a growing concern over faulty algorithms, hidden bias, false positives, abuse of privacy, and potential for abuse by criminals, law enforcement and intelligence agencies. [Read More]
The infamous North Korean Lazarus hacking group is the prime suspect in the $100 million hack of Harmony’s Horizon Bridge, according to new data and research from Elliptic. [Read More]

FEATURES, INSIGHTS // Security Architecture

rss icon

Marc Solomon's picture
As automation continues to evolve, a new approach to accelerate detection and response is emerging based on data and business logic to automatically trigger simple actions that can be standalone or be chained together.
Laurence Pitt's picture
SASE is gaining momentum and can ensure that users receive the correct, risk-based level of access to systems at any moment in time.
Gordon Lawson's picture
While employees want to do the right thing when it comes to protecting their organization from cyber threats, we cannot expect them to be perfect.
Marc Solomon's picture
When automation is consciously balanced between humans and machines, we can ensure security teams always have the best tool for the job.
John Maddison's picture
Cybersecurity deployments have become as complex as the networks they are trying to protect. And that’s not a good thing.
Marc Solomon's picture
An open integration architecture provides the greatest access to data from technologies, threat feeds and other third-party sources, and the ability to drive action back to those technologies once a decision is made.
Torsten George's picture
Cyber resiliency measures (i.e., architectural design, technologies, operational practices) assume that today’s threat actors can achieve a foothold in an organization’s infrastructure and in turn post-exploit activities must be contained and eliminated.
Marc Solomon's picture
As you determine what security technologies to invest in, develop not only a technology roadmap, but also include and align an operational roadmap.
Marc Solomon's picture
Most organizations have a complex security infrastructure that consists of multiple products from multiple vendors to create layers of defense.
Laurence Pitt's picture
Cybersecurity innovation is not quite at the stage where it needs resuscitation, still, the last few months have demonstrated the need for change.