Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

The SANS Institute has disclosed a security incident which resulted in 28,000 records of personally identifiable information (PII) being forwarded to an unknown email address. [Read More]
Symmetry Systems, a provider of Data Store and Object Security (DSOS) solutions, has emerged from stealth mode with $3 million in seed funding. [Read More]
Facebook has announced the availability of Pysa (Python Static Analyzer), an open-source tool designed for the static analysis of Python code. [Read More]
The U.S. Treasury Department has fined Capital One $80 million for careless network security practices that enabled a hack that accessed the personal information of 106 million of the bank’s credit card holders. [Read More]
Silverfort, a provider of an agentless, proxyless authentication platform, has raised $30 million in a Series B funding round led by Aspect Ventures. [Read More]
GreyNoise Intelligence, a startup focused on helping security teams reduce alert fatigue, has raised $4.8 million in seed investment to help the company expand its intelligence service that helps teams “prioritize alerts that matter by quieting ones that don’t.” [Read More]
Microsoft will continue talks to acquire the US operations of popular video-sharing app TikTok, after meeting with President Donald Trump who seemingly backed off his earlier threats to ban the Chinese-owned platform. [Read More]
Google this week announced a series of security and ease-of-use improvements for the Autofill feature in Chrome. [Read More]
Roughly one month after senators introduced a “balanced” bill that would require tech companies to provide law enforcement with access to encrypted user data, a companion bill was introduced in the House of Representatives this week. [Read More]
Cisco has patched critical and high-severity vulnerabilities in its Data Center Network Manager (DCNM) product. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Torsten George's picture
The tactics, techniques, and procedures (TTPs) used in the Twitter attack were not much different than in the majority of other data breaches and serve as valuable lessons for designing a modern cyber defense strategy.
Alastair Paterson's picture
Opportunities for accidental exposure of sensitive information are often compounded by multiple stakeholders using collaborative tools without the proper policies, oversight and security training.
Laurence Pitt's picture
To minimize the effect of an attack, an automated response is vital, which can reduce the amount of time between infection and resolution.
John Maddison's picture
By combining verifiable trust, intent-based segmentation, and integrated security, organizations can establish a trustworthy, security-driven networking strategy.
Jim Ducharme's picture
Let’s look at some real-world examples of the identity management challenges remote work is creating, and at what it means to rethink identity governance and lifecycle to meet those challenges.
Laurence Pitt's picture
Developing an ROI model takes time – my recommendation would be to focus on a simple security project that will return high value to the business when proven successful.
Torsten George's picture
The integration of identity with security is still work in progress, with less than half of businesses having fully implemented key identity-related access controls according to a research study.
Gunter Ollmann's picture
With a diverse and globally distributed workforce, cybersecurity buying decisions will increasingly factor accessibility, usability, and inclusiveness in solution design and operability.
John Maddison's picture
Smart businesses are learning that SD-WAN can play a critical role in quickly—and securely—rolling out new networking environments, and connecting resources and users to data and applications.
Laurence Pitt's picture
Every business is likely to be subject to cyberattacks at some point, and the option is to either take on the cost of putting measures in place before it happens or paying to clean up after.