Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Regulus Cyber raises $6.3 million in seed and Series A funding, and unveils a solution designed to protect sensors, communications and data in cars, robots and drones [Read More]
Slack releases goSDL, an open source secure development lifecycle (SDL) tool designed to provide developers a tailored security checklist for their projects [Read More]
The Internet Society is expanding its Mutually Agreed Norms for Routing Security (MANRS) initiative from just autonomous systems (AS) networks to include internet exchange points (IXPs). [Read More]
Microsoft unveils Windows Defender System Guard runtime attestation, a new Windows platform security technology for all editions of Windows [Read More]
FDA reveals its plans for medical device cybersecurity, including requiring update and patch capabilities built into devices, updated guidance for protecting against risks, and policies and procedures for vulnerability disclosures [Read More]
IBM releases Adversarial Robustness Toolbox, an open source software library designed to help researchers and developers secure artificial intelligence (AI) systems [Read More]
Intel announces new silicon-level security, including threat detection technology and a framework that standardizes security features built into processors, and a strategic collaboration with Purdue University [Read More]
U.S. Energy Department announces funding opportunity for research and development of cybersecurity technologies designed to protect energy infrastructure against attacks [Read More]
IBM adds intelligent orchestration capabilities to incident response platform and launches new threat and vulnerability management service [Read More]
Container security firm StackRox raises $25 million in Series B funding round, bringing the total raised to date to over $39 million. Five other container security startups secured a total of over $100 million in the past years [Read More]

FEATURES, INSIGHTS // Security Architecture

rss icon

Jack Danahy's picture
Jack Danahy, co-founder and CTO of Barkly, attempts to clarify what is and what is not machine learning in endpoint security
Adam Meyer's picture
In the cyber threat intelligence space, there is confusion (much of which is driven by vendors)... where threat information is positioned as finished intelligence.
Scott Simkin's picture
Threat intelligence can play an important role in improving an organization’s overall cybersecurity posture, provided the right case is made and the right processes are put in place.
Avi Chesla's picture
In today’s market, more does not mean better. We need security innovation that makes more of what the industry already has by turning what we have into what we need.
Lance Cottrell's picture
By focusing on key attack surfaces and architecting systems to maximize the effectiveness of our monitoring efforts we can detect and stop intrusions much more quickly.
Rafal Los's picture
Security frameworks are designed to provide a reference for those designing various programmatic security mechanisms in order to benefit from collective successes and failures of the broad community.
Joshua Goldfarb's picture
Security has evolved to the point that I can now say that collection, sensing, and alerting are yesterday’s news.
Scott Simkin's picture
Threat intelligence is only valuable if an organization takes the necessary steps to quickly and easily apply that intelligence to actual security policy.
Johnnie Konstantas's picture
As NSA Chief Hacker Rob Joyce indicated during his recent talk at the Usenix Enigma conference, hackers are patient and persistent.
Joshua Goldfarb's picture
In security, we have grown accustomed to treating the symptoms of our problems, rather than treating the problems themselves.