Security Experts:

Security Infrastructure
long dotted


Nearly one-third of data breaches resulted in someone losing their job, and in North America the C-Suite is most likely to be blamed for a breach [Read More]
Forcepoint has announced a new business unit focusing on securing industrial control systems (ICS) and critical infrastructure. [Read More]
Atlanta-based Privileged Access Management (PAM) solutions provider Bomgar today announced a definitive agreement to acquire BeyondTrust, from an affiliate of Veritas Capital. [Read More]
U.S. Senators send letter to State Department asking about its use of multi-factor authentication and other cybersecurity practices [Read More]
Container security company Sysdig raises $68.5 million, which brings the total funding to date to over $121 million [Read More]
OpenSSL 1.1.1 has been released. The new Long Term Support (LTS) version brings TLS 1.3 and significant security improvements [Read More]
A cyber-espionage group believed to be operating out of China has been using a digitally signed network filtering driver as part of recent attacks, Kaspersky Lab reports. [Read More]
The Mirai and Gafgyt IoT botnets are targeting vulnerabilities in Apache Struts and SonicWall Global Management System (GMS), Palo Alto Networks has discovered. [Read More]
Cisco patches critical and high severity vulnerabilities in its RV series, SD-WAN, Umbrella and other products [Read More]
Opsview recently addressed a series of remote code-execution, command-execution and local privilege-escalation vulnerabilities in the Opsview Monitor. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Preston Hogue's picture
Security teams should think about how company data might connect with data from other organizations or industries and how those combined data sets could be triangulated into a larger picture that ultimately puts you at risk.
Torsten George's picture
The Reddit data breach illustrates the importance of rolling out an approach designed to verify the user, validate their device, limit access and privilege, and learn and adapt to new risks.
Alastair Paterson's picture
A confluence of factors is putting hundreds of thousands of implementations of Enterprise Resource Planning (ERP) applications at risk of cyber attacks.
Marc Solomon's picture
Know your adversaries and yourself are the fundamentals – the first steps of many in the “art of war” with respect to cybersecurity.
Torsten George's picture
Cyber attackers long ago figured out that the easiest way for them to gain access to sensitive data is by compromising an end user’s identity and credentials.
Travis Greene's picture
Privileged Access Management (PAM) can monitor and record user activity to offer misuse deterrence by collecting evidence for prosecution, and can provide more detailed compliance reporting than system logs.
John Maddison's picture
Analysis of a vendor’s underlying design and optimization approaches will enable you to select the solution that best meets your organization’s performance and budgetary requirements.
Joshua Goldfarb's picture
In security, one of our goals should always be to broaden our perspective, field of view, and horizons to minimize the risk that we will be blindsided by something we didn’t see coming.
Josh Lefkowitz's picture
It’s imperative that security practitioners acknowledge the often-confusing nature of insider threat, seek to dispel misconceptions, and provide clear, accurate insight whenever possible.
Joshua Goldfarb's picture
When an organization controls its security technology portion size, it enables the organization to better address strategic requirements and to work far more efficiently.