Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

U.S. Energy Department announces funding opportunity for research and development of cybersecurity technologies designed to protect energy infrastructure against attacks [Read More]
IBM adds intelligent orchestration capabilities to incident response platform and launches new threat and vulnerability management service [Read More]
Container security firm StackRox raises $25 million in Series B funding round, bringing the total raised to date to over $39 million. Five other container security startups secured a total of over $100 million in the past years [Read More]
Industrial Internet Consortium (IIC) develops new IoT Security Maturity Model (SMM), building on its own security framework and reference architecture [Read More]
AWS launches new tools designed to help users manage firewalls, provision private certificates, and safely store and distribute credentials and other secrets [Read More]
Axonius emerges from stealth mode with a platform that leverages existing security and management tools to provide complete visibility and help secure devices [Read More]
Researchers have discovered a new side-channel attack method that can be launched against devices with Intel processors. [Read More]
Internet standards organization Internet Engineering Task Force (IETF) approves version 1.3 of the Transport Layer Security (TLS) encryption protocol [Read More]
Many oil and gas companies in the Middle East reported suffering at least one security incident that resulted in loss of confidential information or disruption to operations, says Siemens [Read More]
Microcode patches for Spectre are available for all Intel CPUs launched in the past five years. The company provided more details on future processors that will include protections against these types of attacks [Read More]

FEATURES, INSIGHTS // Security Architecture

rss icon

Jack Danahy's picture
Jack Danahy, co-founder and CTO of Barkly, attempts to clarify what is and what is not machine learning in endpoint security
Adam Meyer's picture
In the cyber threat intelligence space, there is confusion (much of which is driven by vendors)... where threat information is positioned as finished intelligence.
Scott Simkin's picture
Threat intelligence can play an important role in improving an organization’s overall cybersecurity posture, provided the right case is made and the right processes are put in place.
Avi Chesla's picture
In today’s market, more does not mean better. We need security innovation that makes more of what the industry already has by turning what we have into what we need.
Lance Cottrell's picture
By focusing on key attack surfaces and architecting systems to maximize the effectiveness of our monitoring efforts we can detect and stop intrusions much more quickly.
Rafal Los's picture
Security frameworks are designed to provide a reference for those designing various programmatic security mechanisms in order to benefit from collective successes and failures of the broad community.
Joshua Goldfarb's picture
Security has evolved to the point that I can now say that collection, sensing, and alerting are yesterday’s news.
Scott Simkin's picture
Threat intelligence is only valuable if an organization takes the necessary steps to quickly and easily apply that intelligence to actual security policy.
Johnnie Konstantas's picture
As NSA Chief Hacker Rob Joyce indicated during his recent talk at the Usenix Enigma conference, hackers are patient and persistent.
Joshua Goldfarb's picture
In security, we have grown accustomed to treating the symptoms of our problems, rather than treating the problems themselves.