Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

McAfee acquires NanoSec to strengthen the container security capabilities of its MVISION Cloud and MVISION Server Protection products. [Read More]
Broadcom agreed to acquire the enterprise unit of cybersecurity firm Symantec Corp. for $10.7 billion in a move to further diversify the US semiconductor maker. [Read More]
Cisco released patches to address several vulnerabilities in its Small Business 220 Series Smart Switches, including two bugs rated Critical severity. [Read More]
Twitter again admits that it may have shared some ad-related data collected from users with third parties without permission. [Read More]
Achieving a genuine DevSecOps environment is not easy. Speed in code generation (DevOps) is a different requirement to security in code generation, and one can hinder the other. [Read More]
Slack has unveiled new enterprise security tools that give admins more control over who can access Slack and how it can be used. [Read More]
A new report from the Cloud Security Alliance (CSA) on the top threats to cloud computing suggests that service providers are improving their security. [Read More]
Vulnerabilities in Microsoft’s Azure cloud services are now worth up to $40,000, and a new security testing environment gives researchers the chance to conduct aggressive tests and earn $300,000. [Read More]
Researchers have found additional Dragonblood vulnerabilities in the WPA3 protocol and it only takes $1 worth of AWS computing power to obtain the password of a Wi-Fi network. [Read More]
Misconfiguration in JIRA project management software results in thousands of companies’ filters, dashboards and staff data being publicly exposed. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Ashley Arbuckle's picture
While we can’t turn our attention away from gathering data, we must devise new ways to deal with the onslaught of data. Humans simply can’t keep up, and the problem is getting worse.
Preston Hogue's picture
The best way for the security industry to meet the challenge of modern applications and modern app development is to adopt a modern way of supporting those from a security perspective.
Justin Fier's picture
As executives, developers, security teams, and third-party vendors struggle to exert their influence on digital transformation, threat-actors are exploiting the chaos for their own gain.
Ashley Arbuckle's picture
Breach and Attack Simulation (BAS) tools aid in maintaining a fundamental level of security assurance more quickly and cost effectively than traditional approaches.
John Maddison's picture
Analyzing threat trends can provide security professionals with insights into how to better protect their organizations from the latest cyber threats.
Gunter Ollmann's picture
While cloud SIEM may be new for most organizations, its ability to harness the innate capabilities of public cloud are transforming security operations.
Jim Ducharme's picture
It’s time to address some myths about how facial recognition works, to help increase consumer comfort with biometric-authentication technology.
Laurence Pitt's picture
While security spending is on the increase, it’s up to us as experienced security practitioners to make the most of this spend with a clear ROI that can be reported to the business.
Alastair Paterson's picture
If it takes a whole village to raise a child, it takes a whole community of vendors and business partners to build a secure data environment.
Preston Hogue's picture
ChatOps offers a bridge to a fully realized vision for DevSecOps, offering a much quicker path to resolution for both security and non-security issues.