Security Experts:

Security Infrastructure
long dotted


Cognigo, a Tel Aviv, Israel-based startup focused on data protection and compliance, has completed an $8.5 million Series A round of funding. [Read More]
U.S. Office of Personnel Management (OPM) has improved its security posture since the data breaches disclosed in 2015, but many issues are still unresolved, GAO says in a report [Read More]
Human error has been responsible for creating the majority of security risks in every wave of infrastructure change, and it's no different with containers and Kubernetes. [Read More]
Cloud security company Netskope raises $168.7 million in Series F funding round, bringing the total raised to date to over $400 million [Read More]
Google services inaccessible for some users as a result of a BGP leak that caused traffic to be directed through Russia, China and Nigeria. Unclear if it was a configuration issue or a malicious act [Read More]
A security researcher recently discovered that it is possible to bypass Windows’ User Account Control (UAC) by spoofing the execution path of a file in a trusted directory. [Read More]
A critical vulnerability affecting a GDPR compliance plugin for WordPress has been exploited in the wild [Read More]
Minneapolis-based identity firm Entrust Datacard has acquired Barcelona, Spain firm Safelayer Secure Communications. Financial details were not been disclosed. [Read More]
A default account exposes Cisco Small Business switches to remote attacks. No patch available, but there is a workaround [Read More]
Microsoft releases guidance on enforcing software encryption in Windows after researchers break the full-disk encryption feature of popular SSDs [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Marc Solomon's picture
Adversaries are increasingly masterful at taking advantage of these seams between technologies and teams to infiltrate organizations and remain below the radar.
Ashley Arbuckle's picture
Whatever form your move to the cloud takes, you need the right technologies and talent in place to ensure a secure transition.
Marie Hattar's picture
A big part of making autonomous driving accessible will be the ability for car makers and suppliers to secure the networks that power these increasingly sophisticated vehicles.
Travis Greene's picture
A Consumer Identity and Access Management (CIAM) approach can help your security organization gain a reputation as a business partner that drives heightened user experiences and business competitiveness.
John Maddison's picture
Given the growth of sophisticated and pervasive threats and malware, extra caution must be taken to compensate for the security protections inherent in traditional MPLS connections.
Torsten George's picture
Instead of relying solely on passwords, security professionals should consider implementing a Zero Trust approach to identity and access management based on the following best practices.
Laurence Pitt's picture
The biggest truth about security in public cloud is that it provides security at scale. As a single organization, everything you do is at a scale of one.
Stan Engelbrecht's picture
These seven processes should be automated in order to save valuable time during incident response and security investigation procedures, and help organizations improve their overall cybersecurity posture.
John Maddison's picture
To ensure that your existing IPS solution doesn’t become a weak link in your security strategy, you should be constantly tracking and evaluating its effectiveness—especially older, legacy solutions.
Torsten George's picture
By implementing these measures organizations can limit their exposure to remote access-based cyber threats, while supporting agile business models such as remote work and outsourced IT.