Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Google has released open source tools and libraries that can be used by developers to implement fully homomorphic encryption (FHE). [Read More]
General Manager of the Microsoft Threat Intelligence Center (MSTIC) John Lambert recently keynoted the SecurityWeek threat-intelligence summit where he called for a more collaborative approach to information sharing in cybersecurity. [Read More]
Identity management provider Elisity closes Series A funding to help scale and meet demand for its cloud-delivered cybersecurity platform. [Read More]
The feature is meant to provide users with control over encryption keys and the service used to access them. [Read More]
A cybersecurity firm exposed a database containing more than 5 billion user records that were compromised in breaches suffered by various companies over the past years. [Read More]
Apple ships an out-of-band iOS update for older iPhones and iPads alongside a warning that a pair of WebKit security vulnerabilities may have been actively exploited. [Read More]
Following a major software supply chain compromise that exposed data for several major companies, CodeCov plans to kill off the Bash Uploader tool that was responsible for the breach. [Read More]
Security researchers at Group-IB believe that Chinese nation-state threat actor APT41 performed the cyberattack against aviation IT firm SITA [Read More]
After a major restructuring earlier this year, Akamai hands security leadership reins to 15-year cybersecurity veteran Dr Boaz Gelbord. [Read More]
Recorded Future launches an in-house initiative that sets aside $20 million to invest in seed-stage and Series A startups in the nascent threat-intelligence space. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Marie Hattar's picture
Security is never static, and networks will always be evolving, so make sure you’re continuously validating your security posture and ready for whatever comes next.
John Maddison's picture
As enterprises adopt 5G networks and services to enable digital innovation across new network edges, they are also introducing new risks.
Marc Solomon's picture
As you determine what security technologies to invest in, develop not only a technology roadmap, but also include and align an operational roadmap.
William Lin's picture
The most common “new project” in identity nowadays is in Zero Trust. This concept has been evolving for years, and is building controls around an interesting premise: the idea that every resource will one day be internet-facing.
Gunter Ollmann's picture
In the merry-go-round world of InfoSec technologies and “what’s old is new again,” this year we should include Attack Surface Management with a dash of Continuous.
Derek Manky's picture
Although every network environment is unique, there are steps any organization can begin to implement now to reduce their risk from ransomware and other advanced threats.
Tim Bandos's picture
Shifting to the cloud can be a radical but necessary change. There’s no denying the transition can be time consuming and costly upfront.
Gordon Lawson's picture
While obscurity is an offensive tool for attackers, it also represents a defensive measure for organizations. Let’s consider the benefits of concealing network infrastructure and activity from the outside world to reduce the enterprise attack surface.
William Lin's picture
The combination of “shifting left” and “cloud security” is going to happen and be called “shifting everywhere.”
John Maddison's picture
The best defense in depth strategy is one that enables multiple tools, deployed across the distributed network—including endpoints, clouds, and applications—to work as a unified solution to detect and respond to threats.