Security Experts:

long dotted


OpenSSH 9.0 has been fitted with new defaults to prevent "capture now, decrypt later" attacks linked to advancements in quantum computing. [Read More]
Honeywell, Claroty, Nozomi and Forescout have teamed up to create the Operational Technology Cybersecurity Coalition. [Read More]
The researchers targeted a two-GPU architecture and were able to accurately fingerprint the application running on the remote GPU. [Read More]
PCI Data Security Standard (DSS) v4.0 released to address emerging threats to customer payment information. [Read More]
Threat hunters at Checkmarx raise an alarm after discovering a threat actor fully automating the creation and delivery of "hundreds of malicious packages" into the NPM ecosystem. [Read More]
The Ukraine computer emergency response team reports malicious cyber activity from Chinese threat actors following the Russian invasion. [Read More]
ISC patches vulnerabilities in BIND that could be exploited remotely to cause a denial-of-service (DOS) problems. [Read More]
Software supply chain security fears escalated with the discovery of "deliberate sabotage" of code in the open-source npm package manager ecosystem. [Read More]
NIST has released the final version of a special publication focusing on offering information and guidance to manufacturers for protecting ICS environments. [Read More]
The guidance is generic, meant to be applied to a broad range of network devices. [Read More]

FEATURES, INSIGHTS // Security Architecture

rss icon

Scott Simkin's picture
Threat intelligence can play an important role in improving an organization’s overall cybersecurity posture, provided the right case is made and the right processes are put in place.
Avi Chesla's picture
In today’s market, more does not mean better. We need security innovation that makes more of what the industry already has by turning what we have into what we need.
Lance Cottrell's picture
By focusing on key attack surfaces and architecting systems to maximize the effectiveness of our monitoring efforts we can detect and stop intrusions much more quickly.
Rafal Los's picture
Security frameworks are designed to provide a reference for those designing various programmatic security mechanisms in order to benefit from collective successes and failures of the broad community.
Joshua Goldfarb's picture
Security has evolved to the point that I can now say that collection, sensing, and alerting are yesterday’s news.
Scott Simkin's picture
Threat intelligence is only valuable if an organization takes the necessary steps to quickly and easily apply that intelligence to actual security policy.
Johnnie Konstantas's picture
As NSA Chief Hacker Rob Joyce indicated during his recent talk at the Usenix Enigma conference, hackers are patient and persistent.
Joshua Goldfarb's picture
In security, we have grown accustomed to treating the symptoms of our problems, rather than treating the problems themselves.
Wade Williamson's picture
Data science and machine learning models can assess large groups of cyber threats to find the subtle traits they have in common to better protect organizations.
Tim Layton's picture
While we must continue to use defensive technologies because they help address the level of white noise that has become part of the cost to operate in our hyper-connected, digitized world, we can’t stop there.