Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Federal Communications Commission (FCC) Chairwoman Jessica Rosenworcel proposes strengthening rules around telecom providers’ reporting of data breaches. [Read More]
Recorded Future snaps up SecurityTrails for a direct entry into the booming attack surface management business. [Read More]
A long-term phishing experiment at a 56,000-employee company ends with a caution around the use of simulated phishing lures in corporate security awareness training exercises. [Read More]
Researchers warn that the vulnerability has existed since September 2017 and has likely been exploited in the wild. [Read More]
As the scale and impact of the Log4j security crisis become clearer, defenders brace for a long, bumpy ride filled with software-dependency headaches. [Read More]
Fresh off a high-profile legal triumph over Apple, Corellium gets major attention from investors with Paladin Capital Group leading a $25 million funding round. [Read More]
Adobe documented at least 60 security vulnerabilities in prominent software products and warned that malicious actors could exploit these bugs for code execution, privilege escalation and denial-of-service attacks. [Read More]
LogDNA, a late-stage startup that helps DevOps teams scour logs for signs of problems, has secured a new $50 million investment led by Dave DeWalt’s NightDragon. [Read More]
Researchers flag hundreds of security flaws in routers from Asus, AVM, D-Link, Edimax, Linksys, Netgear, Synology and TP Link. [Read More]
Citing evidence of active exploitation against five specific vulnerabilities, the U.S. cybersecurity agency warned that further delays in applying fixes “pose significant risk to the federal enterprise. [Read More]

FEATURES, INSIGHTS // Security Architecture

rss icon

John Maddison's picture
Cybersecurity deployments have become as complex as the networks they are trying to protect. And that’s not a good thing.
Marc Solomon's picture
An open integration architecture provides the greatest access to data from technologies, threat feeds and other third-party sources, and the ability to drive action back to those technologies once a decision is made.
Torsten George's picture
Cyber resiliency measures (i.e., architectural design, technologies, operational practices) assume that today’s threat actors can achieve a foothold in an organization’s infrastructure and in turn post-exploit activities must be contained and eliminated.
Marc Solomon's picture
As you determine what security technologies to invest in, develop not only a technology roadmap, but also include and align an operational roadmap.
Marc Solomon's picture
Most organizations have a complex security infrastructure that consists of multiple products from multiple vendors to create layers of defense.
Laurence Pitt's picture
Cybersecurity innovation is not quite at the stage where it needs resuscitation, still, the last few months have demonstrated the need for change.
Torsten George's picture
Today’s economic climate exacerbates risks of insider threats, as pending furloughs or pay cuts may tempt employees to exfiltrate data to secure a new job, make up for income losses, etc.
Preston Hogue's picture
The healthcare industry will need advanced security measures to identify and mitigate flaws in new apps carrying the world’s most sensitive, regulated information.
Marie Hattar's picture
Organizations should regularly put security products, processes and people to the test, and the reward is better, more efficient protection against attacks.
Josh Lefkowitz's picture
Choosing which vendor to partner with can be exceptionally difficult for MSSPs due to the oversaturation and complexity of the threat intelligence market.