Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

All ProtonVPN applications have been made open source after undergoing independent security audits. [Read More]
Nearly 250 million Microsoft Customer Service and Support (CSS) records were found exposed to the Internet in insecure Elasticsearch databases. [Read More]
Secure DevOps company Sysdig has raised $70 million in a Series E funding round, which brings the total raised by the company to over $200 million. [Read More]
FireEye (NASDAQ: FEYE) has acquired Cloudvisory, a Dallas, Texas-based provider of tools for cloud visibility, security, and policy management. [Read More]
A hardcoded SSH public key in Fortinet’s Security Information and Event Management FortiSIEM can be abused to access the FortiSIEM Supervisor. [Read More]
NIST has announced version 1.0 of its Privacy Framework, a tool designed to help organizations manage privacy risks. [Read More]
Data security startup Cyral has emerged from stealth mode and announced over $15 million in funding, which it plans on investing in R&D and customer support. [Read More]
High-risk users are aware that they are more likely to be targeted by hackers compared to the general population, but many of them still have bad security habits, a Google survey shows. [Read More]
Facebook now alerts users when they interact with a third-party application using Facebook Login. [Read More]
Hundreds of Internet-accessible, unprotected medical imaging systems expose data on millions of patients worldwide, a cybersecurity firm has discovered. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Jim Ducharme's picture
As the workforce continues to evolve, a one-size-fits-all approach won’t work for different identity and access management needs across organizations.
John Maddison's picture
Outpacing your security capacity with digital innovation is a formula for disaster that may take you out of the running in today’s highly competitive digital marketplace entirely.
Gunter Ollmann's picture
CISOs are increasingly cognizant of the value deep integration of threat intelligence can bring to cloud protection platforms and bottom-line operational budgets.
Torsten George's picture
Perimeter-based security, which focuses on securing endpoints, firewalls, and networks, provides no protection against identity- and credential-based threats.
Preston Hogue's picture
Retailers should ensure that they are proactively scanning for vulnerabilities in the website, as well as deploying a solution to monitor traffic.
Craig Harber's picture
Deep visibility allows organizations to see how different pieces of the overall cyber terrain are communicating with one another, enabling them to highlight potential or existing attack vectors.
Justin Fier's picture
Use of artificial intelligence (AI) will change the role of security teams, and improve companies’ ability to defend their data and networks from future compromises, breaches, and sabotage.
Craig Harber's picture
By using decoys to capture adversary tools, understand their techniques, and detect their actions during early attack phases, security teams can detect problems sooner and avoid long dwell times.
Laurence Pitt's picture
DDoS attacks are moving away from simply sending out broadcast traffic for massive disruption toward more complex and targeted attacks hitting the application layer of the network that can take down specific applications or services.
John Maddison's picture
To build and maintain a secure cyber presence, the best defense is to start with a security-driven development and networking strategy that builds a hardened digital presence from the ground up.