Security Experts:

long dotted


Microsoft, Amazon, ARM, Google, Apple and others have addressed the Meltdown and Spectre vulnerabilities affecting CPUs [Read More]
Devices with Intel, AMD and ARM CPUs are vulnerable to Meltdown and Spectre attacks, which can allow hackers to obtain passwords and other sensitive information [Read More]
DMARC implemented on roughly half of US government domains as a result of a DHS directive, but only 16% quarantine or reject unauthenticated emails [Read More]
Cisco announces availability of Security Connector, an iOS app that gives organizations visibility and control for mobile devices [Read More]
Internet traffic for major tech firms such as Google, Apple, Facebook and Microsoft was briefly rerouted to Russia in a BGP attack [Read More]
Study conducted by Accenture and AMA shows that a majority of physicians in the US have experienced a cybersecurity incident, including phishing, malware and inappropriate access by insiders [Read More]
NIST publishes second draft of the Framework for Improving Critical Infrastructure Cybersecurity [Read More]
Honeywell study shows many industrial companies are slow to secure their data and operations against cyber threats [Read More]
Israel-based anti-phishing firm IRONSCALES raises $6.5 million. Money will be used to expand sales and expedite R&D for its technologies [Read More]
The most common infiltration and exfiltration methods used by attackers are successful much of the time, according to SafeBreach’s latest Hacker’s Playbook report [Read More]

FEATURES, INSIGHTS // Security Architecture

rss icon

Wade Williamson's picture
Data science and machine learning models can assess large groups of cyber threats to find the subtle traits they have in common to better protect organizations.
Tim Layton's picture
While we must continue to use defensive technologies because they help address the level of white noise that has become part of the cost to operate in our hyper-connected, digitized world, we can’t stop there.
Joshua Goldfarb's picture
There are many contextual details that differentiate cyber threat information from threat intelligence. Only with the proper context can data be considered intelligence, rather than simply information.
Joshua Goldfarb's picture
Taking a look at security from a different vantage point that allows us to correlate activity by user, rather than by system alone gives us a very different perspective.
Scott Simkin's picture
When vendors and individuals attempt to keep threat intelligence private, they limit the ability of the entire group to identify and mitigate new threats as they are developed and launched against organizations.
Joshua Goldfarb's picture
Rather than proceed step by step through the process of building and maturing a security operations function, security teams often want to move immediately into very advanced topics.
Alan Cohen's picture
Today’s network perimeter is increasingly not a single physical or virtual place, yet much of the industry debate is still focused on the perimeter.
Jason Polancich's picture
Without a solid base in knowing who you are as a target and what’s going on around you at all times, everything else you do is essentially a half-measure.
Rafal Los's picture
Security leaders struggle to replicate successes from one enterprise to another largely because they are starting from scratch at every new turn.
Joshua Goldfarb's picture
The question of build or buy is not a new one, but it is one that does not adequately suit the implementation of a security solution.