Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Cloudflare said the multi-vector distributed denial of service attack combined DNS amplification attacks and UDP floods and lasted just one minute. [Read More]
AT&T Alien Labs researchers flag new Golang-based malware threat that could potentially infect millions of routers and Internet of Things (IoT) devices. [Read More]
Security researchers spot signs that the Babuk ransomware gang is targeting ProxyShell vulnerabilities in Microsoft Exchange Server. [Read More]
Software supply chain security jitters escalated again Friday with new “critical severity” warnings about malware embedded in two npm package managers with millions of weekly downloads. [Read More]
The NSA and CISA have released cybersecurity guidance to help cloud providers and mobile network operators secure 5G cloud infrastructure. [Read More]
Ranzy Locker ransomware has been targeting businesses in the United States since late 2020, with more than 30 victims identified by July 2021. [Read More]
Illumio's newest product seeks to solve the two primary security issues that come with moving to the cloud: the danger of accidental misconfigurations and the loss of visibility. [Read More]
In the event of a nation-state attack, Microsoft's new security offering will provide proactive monitoring and notification to non-profit organizations. [Read More]
Microsoft, Intel and Goldman Sachs will lead a new supply chain security work group at the Trusted Computing Group (TCG). [Read More]
Full video of panel discussion from SecurityWeek's 2021 CISO Forum on navigating software bill of materials (SBOM) and supply chain security transparency. [Read More]

FEATURES, INSIGHTS // Security Architecture

rss icon

Marc Solomon's picture
As you determine what security technologies to invest in, develop not only a technology roadmap, but also include and align an operational roadmap.
Marc Solomon's picture
Most organizations have a complex security infrastructure that consists of multiple products from multiple vendors to create layers of defense.
Laurence Pitt's picture
Cybersecurity innovation is not quite at the stage where it needs resuscitation, still, the last few months have demonstrated the need for change.
Torsten George's picture
Today’s economic climate exacerbates risks of insider threats, as pending furloughs or pay cuts may tempt employees to exfiltrate data to secure a new job, make up for income losses, etc.
Preston Hogue's picture
The healthcare industry will need advanced security measures to identify and mitigate flaws in new apps carrying the world’s most sensitive, regulated information.
Marie Hattar's picture
Organizations should regularly put security products, processes and people to the test, and the reward is better, more efficient protection against attacks.
Josh Lefkowitz's picture
Choosing which vendor to partner with can be exceptionally difficult for MSSPs due to the oversaturation and complexity of the threat intelligence market.
Torsten George's picture
Shifting traditional perimeter-based enterprise security strategies to a Zero Trust approach provides more robust prevention, detection, and incident response capabilities to protect continuously expanding attack surfaces.
Grady Summers's picture
There are many pitfalls, and some simple rules that can help you make smarter decisions if you are in looking to purchase security products seen at RSA Conference.
Josh Lefkowitz's picture
Evaluating a threat intelligence vendor’s collection strategy effectively is a complex process that requires far more than simply obtaining the answers to the questions outlined above.