Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

The new and emerging world of artificial intelligence -- that is, algorithms -- promises huge benefits for industry in increased speeds and lower costs; just as it does in the financial markets. [Read More]
Security experts earned more than $100,000 for over 100 vulnerabilities reported as part of the Hack the Air Force 2.0 bug bounty challenge [Read More]
Kaspersky files new lawsuit over the U.S. government’s software ban, this time challenging the National Defense Authorization Act (NDAA) [Read More]
Pepperl+Fuchs HMIs are vulnerable to Meltdown and Spectre attacks, but exploitation should not be easy if organizations follow security best practices [Read More]
Schneider Electric patches vulnerabilities in IGSS automation system, including in SCADA software and mobile applications [Read More]
Seagate and RackTop join forces to launch a secure data storage product designed to help government organizations address cybersecurity and compliance challenges [Read More]
Mozilla announces intention to restrict the AppCache mechanism to secure connections in Firefox and other major web browser vendors plan on doing the same [Read More]
Lenovo has released patches for two critical vulnerabilities that were found last year in certain Broadcom Wi-Fi controllers. [Read More]
IBM releases firmware and operating system updates to address the Meltdown and Spectre vulnerabilities in Power Systems servers [Read More]
Decryption keys for a current version of Cryakl ransomware have been obtained and uploaded to the NoMoreRansom website [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Marc Solomon's picture
With the right technologies and/or services, every organization can get relevant, prioritized threat intelligence how, when and where they need it.
Ashley Arbuckle's picture
While it’s easy to deploy new IT services, many of the security tools and processes that we’ve used in our networks and data centers will not work in public clouds.
John Maddison's picture
Digital transformation is creating a whole new set of risks that, especially where critical infrastructure is involved, could have potentially devastating consequences.
Scott Simkin's picture
Blending in with legitimate users, attackers can infiltrate organizations and dwell inside networks for months or even years without being detected.
Marc Solomon's picture
There are four primary threat intelligence models that businesses employ today – from one to one to many to many. Let’s take a closer look at each.
Torsten George's picture
To limit exposure to privileged credential attacks, organizations need to rethink their enterprise security strategy and move to an identity-centric approach based on a Zero Trust model.
David Holmes's picture
Several tech vendors have been added to the list of vendors vulnerable to a variation on the Bleichenbacher attack called the ROBOT attack.
Marc Solomon's picture
You need to increase the level of personalization to maximize the impact of threat data on your security operations and more effectively and efficiently protect your organization. There are several sources you can turn to.
Joshua Goldfarb's picture
There are far too many cybersecurity entrepreneurs who simply chase after the hot topic of the day and not working to solve the problems of tomorrow.
Travis Greene's picture
Maintaining consistent security controls across the entire hybrid IT environment is growing increasingly complex as more cloud services are adopted.