Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

RSA has made improvements to the ECAT threat detection and remediation tool, and the Via Lifecycle and Governance identity management solution.
Centrify has unveiled expanded support for Mac OS X computers, the recently released Apple Watch, and Near Field Communication (NFC).
Biometrics-as-a-service provider HYPR announces general availability of biometric tokenization platform.
Many of the cyberattacks suffered by critical infrastructure organizations resulted in physical damage, and experts fear that future incidents could lead to loss of human life.
OpenDNS’s BGP Stream will alert users via Twitter of hijackings and outages involving the Border Gateway Protocol (BGP)
Lloyd's estimated an attack on the U.S. power grid affecting most of the East Coast would result in claims estimated at $21.4 billion.
A little over half of United States-based IT leaders and a third United Kingdom-based leaders believe it would be "easy" for an ex-employee to log in and access systems or information with old passwords.
A group of computer code experts said Tuesday that law enforcement cannot be given special access to encrypted communications without opening the door to "malicious" actors.
Verisign has launched a new cloud-based DNS Firewall designed to offer protection from threats and malware, with the ability for customers to customize filtering based on their organizational needs.
The Industrial Control System Information Sharing and Analysis Center (ICS-ISAC) announced this week that it would merge with Webster University's Cyberspace Research Institute (CRI).

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Jason Polancich's picture
In today’s cyber defense world as in other business domains, actions should speak louder than words. Yet, too often, being “actionable” is just that - a word with no meaning.
Travis Greene's picture
Does it really matter if someone steals your healthcare records? What would a hacker do with that information? Sell it? To whom and for what purpose?
Alan Cohen's picture
Like other forms of technical debt, security debt must be paid down, which ultimately leads to a more agile and secure enterprise.
Danelle Au's picture
If your organization is not equipped to deal with the security of Emergent IT, it is probably not equipped to deal with the security of mainstream applications sanctioned by IT.
Wade Williamson's picture
While malware is obviously a critically important tool in the attacker’s arsenal, it is just one of many that make sophisticated attacks successful.
David Holmes's picture
Whether Shodan's John Matherly intends it to or not, Shodan is already exposing the sham of consumer-grade security that we all suspected would be a hallmark of The Internet of Things.
Rafal Los's picture
Often times it’s the insiders that enable the external attacker – either willingly or otherwise, and the result can be even more devastating than that of an external attacker.
Travis Greene's picture
Can IT security find a way to coexist with wearables faster than the first BYOD war and avoid a second war?
Scott Simkin's picture
In the moments after a breach, security teams will often focus on the event itself, but not draw additional insight from the attack, or analyze the events surrounding it.
Joshua Goldfarb's picture
When moving to the cloud, companies must understand the implications, enumerate the risks, and mitigate those risks accordingly.