Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Citing evidence of active exploitation against five specific vulnerabilities, the U.S. cybersecurity agency warned that further delays in applying fixes “pose significant risk to the federal enterprise. [Read More]
The surge in venture capital investments in the attack surface management space continues with Israeli risk management firm CyCognito announcing a new $100 million funding round. [Read More]
Cybersecurity unicorn Aqua Security has acquired software development security company Argon for tens of millions of dollars. [Read More]
Soveren is building technology for businesses to detect and resolve privacy incidents and stay compliant with GDPR and other regulations. [Read More]
Cryptocurrency trading powerhouse Coinbase has announced plans to acquire Unbound Security, an Israeli startup providing protection for cryptographic keys and credentials. [Read More]
Security experts warn that the 'Sabbath' ransomware group is targeting organizations in education, health and natural resources in both the United States and Canada. [Read More]
Axiado raises $25 million to build a new class of security processors that provide platform root-of-trust for large enterprise customers. [Read More]
Software supply chain security company Cycode has raised $56 million in a Series B funding round. [Read More]
Customer identity and access management (CIAM) start-up Strivacity has raised $9.3 million in a Series A funding round from TenEleven Ventures and Toba Capital. [Read More]
Google Project Zero's Natalie Silvanovich reports a pair of Zoom security defects that expose Windows, macOS, Linux, iOS and Android users to malicious hacker attacks. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Laurence Pitt's picture
With tight resources for managing healthcare, the IT challenge to keep track of vast amounts of data being created, accessed and modified is critical.
Marie Hattar's picture
In order to deliver on the promise of 5G, we need new industry standards for security, testing, and training to proactively combat 5G cyber threats and minimize risks.
Marc Solomon's picture
Security Operations Centers do not need another acronym. What they need are capabilities that enable them to address their top use cases faster and more thoroughly in the face of evolving attacks.
Gordon Lawson's picture
For red teams, using an obfuscated network for testing offers the advantage of hiding who is performing the attack and where it is originating, for a more real-life context
John Maddison's picture
Recent changes have resulted in a proliferation of devices and users working from anywhere, which has expanded the digital attack surface and exposed more applications, devices, data, and users to risk.
Gordon Lawson's picture
Most cyber insurance providers are demanding that companies supply proof of their backup implementation in order to obtain an affordable policy.
John Maddison's picture
Zero-trust network access (ZTNA) simplifies secure connectivity by providing seamless, per-use access to applications, no matter where the user or application may be located.
Torsten George's picture
While there is no silver bullet to prevent cybersecurity attacks, ZTNA has become a necessity for organizations on their digital transformation journey by allowing to minimize the attack surface while ensuring the productivity of remote workers.
Laurence Pitt's picture
Cybersecurity Awareness Month is an excellent time to reflect on any changes made, and that might still need to be made since, as for many people hybrid has become the working ‘normal.’
John Maddison's picture
Organizations considering ZTNA should look for these three essential components as a minimum when evaluating any solution.