Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

AMD has launched its new EPYC 7003 (Milan) processors and the company has shared some information about the new and enhanced security features. [Read More]
The company seeks to improve security of servers and connected devices with Secured-core Server and Edge Secured-core. [Read More]
Following the recent attack on the U.S. Capitol, where a parade of people stormed the building and gained access to unprotected computers, industry professionals share thoughts on what they would do if they were in charge of cybersecurity at an organization that could end up in a similar situation. [Read More]
The CSET bureau will focus on international cyberspace security and policy issues. [Read More]
Red Hat buys an innovative container security startup and announced plans to open-source the technology at a later date. [Read More]
the plan sets out priorities and goals around the establishment of global standards to define maritime threats, beefing up threat intel and information sharing, and increasing the cybersecurity workforce in the maritime sector. [Read More]
Cloud-delivered network security startup iboss has closed a new round of financing to speed up growth in a lucrative market. [Read More]
The 47-minute outage last Monday, which severely affected operations at workplaces and schools globally, was caused by a bug in an automated quota management system that powers the Google User ID Service. [Read More]
Dell announces new security offerings to help protect organizations against threats targeting the supply chain, the boot process and data. [Read More]
Intel announces new security technologies that will be present in the company’s upcoming 3rd gen Xeon Scalable processor, code-named Ice Lake. [Read More]

FEATURES, INSIGHTS // Security Architecture

rss icon

Ashley Arbuckle's picture
As a security professional, it’s time to take a fresh look at what your organization can do to compensate for insider negligence.
Jack Danahy's picture
Jack Danahy, co-founder and CTO of Barkly, attempts to clarify what is and what is not machine learning in endpoint security
Adam Meyer's picture
In the cyber threat intelligence space, there is confusion (much of which is driven by vendors)... where threat information is positioned as finished intelligence.
Scott Simkin's picture
Threat intelligence can play an important role in improving an organization’s overall cybersecurity posture, provided the right case is made and the right processes are put in place.
Avi Chesla's picture
In today’s market, more does not mean better. We need security innovation that makes more of what the industry already has by turning what we have into what we need.
Lance Cottrell's picture
By focusing on key attack surfaces and architecting systems to maximize the effectiveness of our monitoring efforts we can detect and stop intrusions much more quickly.
Rafal Los's picture
Security frameworks are designed to provide a reference for those designing various programmatic security mechanisms in order to benefit from collective successes and failures of the broad community.
Joshua Goldfarb's picture
Security has evolved to the point that I can now say that collection, sensing, and alerting are yesterday’s news.
Scott Simkin's picture
Threat intelligence is only valuable if an organization takes the necessary steps to quickly and easily apply that intelligence to actual security policy.
Johnnie Konstantas's picture
As NSA Chief Hacker Rob Joyce indicated during his recent talk at the Usenix Enigma conference, hackers are patient and persistent.