Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

CISA and the NSA have published considerations on the benefits and security of implementing an Open Radio Access Network (RAN) architecture. [Read More]
Industry professionals comment on the new guidance from the US government asking for security guarantees from software vendors. [Read More]
Dig Security’s latest financing comes as venture capital investors rush to place bets on startups jostling for space in the cloud data security space. [Read More]
SecurityWeek spoke with IBM's chief privacy officer (CPO) Christina Montgomery to seek a better understanding of the issues surrounding ethical artificial intelligence [Read More]
The new sanctions designate Iran’s Ministry of Intelligence and Security (MOIS) and its Minister of Intelligence for engaging in cyber-enabled activities against the United States and its allies. [Read More]
The U.S. government's CISA, NSA, and ODNI have released the first part of a three-part joint guidance series on securing the software supply chain. [Read More]
The latest funding was led by CIBC Innovation Banking and brings the total raised by the Maryland start-up to $100 million. [Read More]
A group of academic researchers have designed an open source Node.js vulnerability hunting tool that has already identified 180 security flaws. [Read More]
CISA urges critical infrastructure leaders to start preparing for the migration to the post-quantum cryptographic standard that NIST will publish in 2024. [Read More]
Password management software firm LastPass has suffered a data breach that led to the theft of source code and proprietary technical information. [Read More]

FEATURES, INSIGHTS // Security Architecture

rss icon

Marc Solomon's picture
Cyberattacks and data breaches continue to rise year-over-year and another so-called silver bullet technology isn’t going to stop that trend.
Marc Solomon's picture
As automation continues to evolve, a new approach to accelerate detection and response is emerging based on data and business logic to automatically trigger simple actions that can be standalone or be chained together.
Laurence Pitt's picture
SASE is gaining momentum and can ensure that users receive the correct, risk-based level of access to systems at any moment in time.
Gordon Lawson's picture
While employees want to do the right thing when it comes to protecting their organization from cyber threats, we cannot expect them to be perfect.
Marc Solomon's picture
When automation is consciously balanced between humans and machines, we can ensure security teams always have the best tool for the job.
John Maddison's picture
Cybersecurity deployments have become as complex as the networks they are trying to protect. And that’s not a good thing.
Marc Solomon's picture
An open integration architecture provides the greatest access to data from technologies, threat feeds and other third-party sources, and the ability to drive action back to those technologies once a decision is made.
Torsten George's picture
Cyber resiliency measures (i.e., architectural design, technologies, operational practices) assume that today’s threat actors can achieve a foothold in an organization’s infrastructure and in turn post-exploit activities must be contained and eliminated.
Marc Solomon's picture
As you determine what security technologies to invest in, develop not only a technology roadmap, but also include and align an operational roadmap.
Marc Solomon's picture
Most organizations have a complex security infrastructure that consists of multiple products from multiple vendors to create layers of defense.