Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Intel announces new silicon-level security, including threat detection technology and a framework that standardizes security features built into processors, and a strategic collaboration with Purdue University [Read More]
U.S. Energy Department announces funding opportunity for research and development of cybersecurity technologies designed to protect energy infrastructure against attacks [Read More]
IBM adds intelligent orchestration capabilities to incident response platform and launches new threat and vulnerability management service [Read More]
Container security firm StackRox raises $25 million in Series B funding round, bringing the total raised to date to over $39 million. Five other container security startups secured a total of over $100 million in the past years [Read More]
Industrial Internet Consortium (IIC) develops new IoT Security Maturity Model (SMM), building on its own security framework and reference architecture [Read More]
AWS launches new tools designed to help users manage firewalls, provision private certificates, and safely store and distribute credentials and other secrets [Read More]
Axonius emerges from stealth mode with a platform that leverages existing security and management tools to provide complete visibility and help secure devices [Read More]
Researchers have discovered a new side-channel attack method that can be launched against devices with Intel processors. [Read More]
Internet standards organization Internet Engineering Task Force (IETF) approves version 1.3 of the Transport Layer Security (TLS) encryption protocol [Read More]
Many oil and gas companies in the Middle East reported suffering at least one security incident that resulted in loss of confidential information or disruption to operations, says Siemens [Read More]

FEATURES, INSIGHTS // Security Architecture

rss icon

Wade Williamson's picture
Data science and machine learning models can assess large groups of cyber threats to find the subtle traits they have in common to better protect organizations.
Tim Layton's picture
While we must continue to use defensive technologies because they help address the level of white noise that has become part of the cost to operate in our hyper-connected, digitized world, we can’t stop there.
Joshua Goldfarb's picture
There are many contextual details that differentiate cyber threat information from threat intelligence. Only with the proper context can data be considered intelligence, rather than simply information.
Joshua Goldfarb's picture
Taking a look at security from a different vantage point that allows us to correlate activity by user, rather than by system alone gives us a very different perspective.
Scott Simkin's picture
When vendors and individuals attempt to keep threat intelligence private, they limit the ability of the entire group to identify and mitigate new threats as they are developed and launched against organizations.
Joshua Goldfarb's picture
Rather than proceed step by step through the process of building and maturing a security operations function, security teams often want to move immediately into very advanced topics.
Alan Cohen's picture
Today’s network perimeter is increasingly not a single physical or virtual place, yet much of the industry debate is still focused on the perimeter.
Jason Polancich's picture
Without a solid base in knowing who you are as a target and what’s going on around you at all times, everything else you do is essentially a half-measure.
Rafal Los's picture
Security leaders struggle to replicate successes from one enterprise to another largely because they are starting from scratch at every new turn.
Joshua Goldfarb's picture
The question of build or buy is not a new one, but it is one that does not adequately suit the implementation of a security solution.