Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Researcher discovers that Cisco’s CSPC product, which collects information from Cisco devices installed on a network, has a default account that can provide access to unauthorized users. [Read More]
AV-Comparatives has analyzed 250 antimalware Android applications offered on Google Play and found that many either fail to detect threats or they are simply fake. [Read More]
Internet performance and security firm Cloudflare raises $150 million in new funding round. The money will be used to extend product ranges and continue international expansion. [Read More]
Cloud and application security provider F5 Networks is acquiring NGINX, a provider of technologies for application development and delivery, for approximately $670 million. [Read More]
Box enterprise shared links can leak sensitive information if access to them hasn’t been restricted to relevant users only, Adversis security researchers warn. [Read More]
For a second year in a row, NASA’s cybersecurity program gets failing grade from the Office of Inspector General. [Read More]
Google has introduced a new set of services to provide cloud customers with improved protection from unsafe websites, distributed denial of service (DDoS) attacks, and other threats. [Read More]
Over a dozen vulnerabilities, including ones classified as critical, have been found by researchers in industrial switches from Moxa. Patches and mitigations have been released by the vendor. [Read More]
An unprotected MongoDB database was recently found exposing over 800 million records, including email addresses and phone numbers. [Read More]
Exploit acquisition firm Zerodium is offering up to $500,000 for VMware ESXi and Microsoft Hyper-V exploits that allow the attacker to gain full access to the host. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Ellison Anne Williams's picture
Data protection schemes must recognize and secure data as it exists at all points in the processing lifecycle, whether at rest, in transit, or in use.
Torsten George's picture
By implementing the core pillars of GDPR, organizations can assure they meet the mandate’s requirements while strengthening their cyber security posture.
Ashley Arbuckle's picture
Through market consolidation, organizations can derive exponentially more value from their security tools.
John Maddison's picture
While many organizations are struggling to secure their diverse, complex, and rapidly expanding networks, they are now facing a new challenge created by convergence.
Laurence Pitt's picture
As we continue to increase our dependency on communications networks and technologies to move tremendous amounts of data, we open up greater potential for serious disaster should they be compromised.
Erin O’Malley's picture
It’s important for IT security teams to understand the slight, but potentially significant difference between MFA and two-factor (2FA) authentication.
Stan Engelbrecht's picture
Automation tools have changed the way that security teams turn information into action, with the ability to automatically search and collect threat intelligence from a variety of third-party sources.
Ashley Arbuckle's picture
Network Segmentation can prevent lateral movement and effectively improve security, and is a continuous journey that every organization should take.
John Maddison's picture
Security frameworks need to see and adapt to network changes, share and correlate threat intelligence, and respond to threats as a unified system.
Torsten George's picture
Since multi-factor authentication requires several elements for identity verification, it’s one of the best ways to prevent unauthorized users from accessing sensitive data and moving laterally within the network.