Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

In a letter to the U.S. House of Representatives, several Internet organizations are urging for an amendment to a surveillance bill to prohibit warrantless collection of search and browsing history. [Read More]
Encrypted messaging service Signal has announced the introduction of a new feature that allows users to recover their data if they switch to a new device. [Read More]
On May 22, Zoom will share a draft of the cryptographic design it wants to use for its future end-to-end encryption feature. [Read More]
Both firms will continue to operate as they are, but with the ability to enhance integrated product offerings from the other's portfolio. [Read More]
At this week’s Build virtual event, Microsoft announced new Identity and Azure features meant to improve security for both application developers and enterprise customers. [Read More]
Google this week released Chrome 83 to the stable channel with patches for a total of 38 vulnerabilities, with improved Safe Browsing protection, and updated privacy and security controls. [Read More]
Container security company Aqua Security has raised another $30 million, which brings the total raised by the firm to date to more than $130 million. [Read More]
Verizon's Data Breach Investigations Report (DBIR) remains a fundamental asset for the discovery of existing and evolving threats, allowing practitioners to see where they should focus effort for an effective risk-based security posture. [Read More]
Facebook founder Mark Zuckerberg on Monday urged the European Union to take the lead in setting global standards for tech regulation or risk seeing countries follow China as a model. [Read More]
Huawei is at the center of the U.S.-Chinese conflict over Beijing’s technology ambitions, which Washington worries might erode American industrial leadership. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Laurence Pitt's picture
Every business is likely to be subject to cyberattacks at some point, and the option is to either take on the cost of putting measures in place before it happens or paying to clean up after.
Torsten George's picture
Today’s economic climate exacerbates risks of insider threats, as pending furloughs or pay cuts may tempt employees to exfiltrate data to secure a new job, make up for income losses, etc.
Gunter Ollmann's picture
CISOs are increasingly partnering with DevOps leaders and vigilantly modernizing secure development lifecycle (SDLC) processes to embrace new machine learning (ML) approaches.
John Maddison's picture
The rate at which recent networking changes have had to occur, and the speed at which cybercriminals have been able to respond, teach us clearly what is needed going forward to ensure ongoing proactive cyber protection.
Laurence Pitt's picture
For an MSP looking to grow business, the convergence of SD-WAN and security, along with the transitional needs of customers, translates to opportunity.
Torsten George's picture
With IT budgets being cut back in response to the economic contraction caused by the current health crisis, security teams need to deliver more with less.
Marie Hattar's picture
Organizations should regularly put security products, processes and people to the test, and the reward is better, more efficient protection against attacks.
John Maddison's picture
Network connections that can change instantaneously in response to shifting business requirements can take a security solution minutes or hours to be reconfigured. And that lag time is prime for exploitation.
Laurence Pitt's picture
Working remotely should be a positive experience. Here are a few simple suggestions that may help during this time of change.
Torsten George's picture
Static passwords lack the ability to verify whether the user accessing data is authentic or just someone who bought a compromised password.