Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Normalyze closes a $22 million funding round as venture capitalists rush to place bets on the newly coined Data Security Posture Management (DSPM) space. [Read More]
Israeli startup Cyolo raises a massive Series B round to compete in the market for zero trust networking access. [Read More]
Offensive security platform provider Hadrian receives €10.5 million ($11 million) unsolicited funding that will drive scale. [Read More]
Cybersecurity authorities in the US, UK, and New Zealand share recommended actions on how to configure and monitor PowerShell to eliminate security risks. [Read More]
Cryptographers at Swiss university ETH Zurich have found at least five exploitable security flaws in the privacy-themed MEGA cloud storage service [Read More]
Aqua Security releases open source tool for auditing the software supply chain to ensure compliance with newly created CIS guidelines. [Read More]
Cyberint, a threat intelligence startup competing in the attack surface management category, has raised $40 million in financing led by StageOne Late Stage Arm. [Read More]
Big-game malware hunters at Volexity call attention to a sophisticated Chinese APT caught recently exploiting a Sophos firewall zero-day to plant backdoors and launch man-in-the-middle attacks. [Read More]
SecurityWeek is publishing a daily digest summarizing some of the announcements made by vendors at the RSA Conference 2022. [Read More]
SecurityWeek is publishing a daily digest summarizing some of the announcements made by vendors at the RSA Conference 2022. [Read More]

FEATURES, INSIGHTS // Security Architecture

rss icon

Torsten George's picture
Today’s economic climate exacerbates risks of insider threats, as pending furloughs or pay cuts may tempt employees to exfiltrate data to secure a new job, make up for income losses, etc.
Preston Hogue's picture
The healthcare industry will need advanced security measures to identify and mitigate flaws in new apps carrying the world’s most sensitive, regulated information.
Marie Hattar's picture
Organizations should regularly put security products, processes and people to the test, and the reward is better, more efficient protection against attacks.
Josh Lefkowitz's picture
Choosing which vendor to partner with can be exceptionally difficult for MSSPs due to the oversaturation and complexity of the threat intelligence market.
Torsten George's picture
Shifting traditional perimeter-based enterprise security strategies to a Zero Trust approach provides more robust prevention, detection, and incident response capabilities to protect continuously expanding attack surfaces.
Grady Summers's picture
There are many pitfalls, and some simple rules that can help you make smarter decisions if you are in looking to purchase security products seen at RSA Conference.
Josh Lefkowitz's picture
Evaluating a threat intelligence vendor’s collection strategy effectively is a complex process that requires far more than simply obtaining the answers to the questions outlined above.
Ashley Arbuckle's picture
As a security professional, it’s time to take a fresh look at what your organization can do to compensate for insider negligence.
Jack Danahy's picture
Jack Danahy, co-founder and CTO of Barkly, attempts to clarify what is and what is not machine learning in endpoint security
Adam Meyer's picture
In the cyber threat intelligence space, there is confusion (much of which is driven by vendors)... where threat information is positioned as finished intelligence.