Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Apple has paid out a total of $20 million through its bug bounty program and it’s now providing more information on rewards. [Read More]
The White House has added the chemical sector to its ICS Cybersecurity Initiative, after electric, pipeline and water. [Read More]
The TSA has issued new cybersecurity requirements for freight and passenger rail operators. [Read More]
European venture capital and private equity firm Smartfin has acquired Hex-Rays, the company behind the widely deployed IDA Pro software disassembler. [Read More]
Microsoft releases patches to address more than 90 security defects affecting products in the Windows ecosystem but there's no fix yet for a pair of exploited Exchange Server bugs. [Read More]
The websites for a number of major US airports were briefly taken offline Monday after a cyberattack promoted by a pro-Russian hacking group. [Read More]
A new Silicon Valley startup called Endor Labs has closed a $25 million seed-stage funding round to build a dependency lifecycle management platform to secure software supply chain. [Read More]
In this Q&A from the SecurityWeek CISO Forum, venture capital investors discuss the state of cybersecurity investments, business strategies in a confusing economic climate, predictions on hot and not-so-hot product categories, and what happens with all those cybersecurity unicorns. [Read More]
The funding frenzy in the software supply chain space now includes Ox Security, an Israeli startup that just raised a whopping $34 million in seed funding. [Read More]
GuidePoint Security launches industrial control systems (ICS) security service offerings, including security program review and penetration testing. [Read More]

FEATURES, INSIGHTS // Security Architecture

rss icon

Landon Winkelvoss's picture
How organizations can use managed services to optimize their threat intelligence program during an economic downturn.
Marc Solomon's picture
Cyberattacks and data breaches continue to rise year-over-year and another so-called silver bullet technology isn’t going to stop that trend.
Marc Solomon's picture
As automation continues to evolve, a new approach to accelerate detection and response is emerging based on data and business logic to automatically trigger simple actions that can be standalone or be chained together.
Laurence Pitt's picture
SASE is gaining momentum and can ensure that users receive the correct, risk-based level of access to systems at any moment in time.
Gordon Lawson's picture
While employees want to do the right thing when it comes to protecting their organization from cyber threats, we cannot expect them to be perfect.
Marc Solomon's picture
When automation is consciously balanced between humans and machines, we can ensure security teams always have the best tool for the job.
John Maddison's picture
Cybersecurity deployments have become as complex as the networks they are trying to protect. And that’s not a good thing.
Marc Solomon's picture
An open integration architecture provides the greatest access to data from technologies, threat feeds and other third-party sources, and the ability to drive action back to those technologies once a decision is made.
Torsten George's picture
Cyber resiliency measures (i.e., architectural design, technologies, operational practices) assume that today’s threat actors can achieve a foothold in an organization’s infrastructure and in turn post-exploit activities must be contained and eliminated.
Marc Solomon's picture
As you determine what security technologies to invest in, develop not only a technology roadmap, but also include and align an operational roadmap.