Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

AWS has expanded its portfolio with three new services and capabilities meant to help organizations build and operate securely in the cloud. [Read More]
CrackQ is an intuitive interface for Hashcat served by a REST API and a JavaScript front-end web application for ease of use [Read More]
A university student in California has filed a class-action lawsuit against video app TikTok, which she accuses of harvesting large amounts of user data and storing it in China. [Read More]
Google says 80% of Android apps encrypt traffic by default and the percentage is even higher in the case of applications designed for the latest versions of the operating system. [Read More]
HelpSystems has acquired ClearSwift, a Switzerland-based firm that provides deep content inspection and adaptive filtering for documents within the network and at entry and exit points. [Read More]
The European Commission said Monday it had begun a "preliminary investigation" into how Facebook and Google collect personal data and what they do with it. [Read More]
Twitter and Facebook this week took action against malicious mobile software development kits (SDKs) that were used to improperly access user data. [Read More]
Israel-based cybersecurity startup Cymulate has raised $15 million in a Series B funding round led by Vertex Growth Fund. [Read More]
Palo Alto Networks enters agreement to acquire cloud security company Aporeto for roughly $150 million in cash. [Read More]
Twitter users no longer need a phone number to use 2-Factor Authentication (2FA) to secure their accounts, and can now use codes via text messages , mobile security apps, and security keys. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

John Maddison's picture
To build and maintain a secure cyber presence, the best defense is to start with a security-driven development and networking strategy that builds a hardened digital presence from the ground up.
Joshua Goldfarb's picture
Change may not always be on the docket, but when it is, how can we embrace it, understand it, and work to create a constructive environment around it?
Torsten George's picture
Securing multi-cloud and hybrid environments creates an unfamiliar situation for many organizations, in which they’re unsure of who is responsible for controlling access to and securing the underlying infrastructure.
Craig Harber's picture
Cybersecurity teams need actionable insight into the latest techniques, tactics and procedures being used by attackers and a continuous understanding of their environment and anomalous behavior.
Marc Solomon's picture
Having a platform that serves as a central repository allows you to aggregate internal threat and event data with external threat feeds and normalize that data so that it is in a usable format.
Preston Hogue's picture
Every piece of hardware, every integration, every API, every process, as well as applications themselves, are potential targets.
Laurence Pitt's picture
The best way to stay ahead of threats while enabling business agility to keep up with the latest technology advances is to look to the network as the first line of defense.
Justin Fier's picture
The arrival of 5G will fuel an explosion of never-before-seen IoT machines, introducing uncharted vulnerabilities and opening the door for cyber-criminals to compromise our increasingly intertwined cities.
Craig Harber's picture
Because attackers will exploit the paths of least resistance and move laterally through the enterprise, visibility must include all managed and unmanaged assets (enterprise IoT, shadow IoT, legacy systems, etc.)
John Maddison's picture
Security-Driven Networking is a new, strategic approach to security that enables the seamless expansion of network environments and services without ever compromising on security.