Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

If you haven’t tested your mitigation capability recently – or been the victim of an attack – you probably don’t know how well you can detect and respond to one, which could put your organization at risk. [Read More]
Thirty-nine cybersecurity-related M&A deals were announced in September 2022. [Read More]
Israeli startup LayerX has joined the list of companies scoring investor interest in the tricky enterprise browser market. [Read More]
In this Q&A from the SecurityWeek CISO Forum, venture capital investors discuss the state of cybersecurity investments, business strategies in a confusing economic climate, predictions on hot and not-so-hot product categories, and what happens with all those cybersecurity unicorns. [Read More]
CISA has published guidance for organizations to prepare for the November 1, 2022, move from Traffic Light Protocol (TLP) version 1.0 to TLP 2.0. [Read More]
Microsoft intercepts a Lazarus sub-group rigging popular open source software utilities to plant dangerous malware implants. [Read More]
The funding frenzy in the software supply chain space now includes Ox Security, an Israeli startup that just raised a whopping $34 million in seed funding. [Read More]
A recent survey from Machine identity solutions provider Venafi aimed to explore the complexity of cloud environments and the resulting impact on cybersecurity [Read More]
Cisco has confirmed that tens of its enterprise routers and switches are impacted by four bypass vulnerabilities in Layer-2 (L2) network security controls. [Read More]
Recent high-profile cyberattacks have demonstrated the effectiveness of an interesting method for getting past MFA. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

John Maddison's picture
By integrating with native security services on major cloud platforms, a CNP solution can effectively correlate security findings to pinpoint risks and recommend effective mitigation.
William Lin's picture
AppSec is key to protecting production workloads from modern threats, but there are still too many silos and too much friction in existing implementations.
John Maddison's picture
Universal ZTNA is the easiest and most effective way to ensure that every user and device has secure access to the applications they need to do their jobs.
Gordon Lawson's picture
Zero trust is a great way to approach security, but we need to change the paradigm to prevent threats, instead of just detecting them.
Joshua Goldfarb's picture
By understanding how to identify, isolate, and remove unwanted bot and fraud traffic, enterprises can remove the noise clouding the visibility they have into their online applications.
Laurence Pitt's picture
A well-implemented ZTNA with the ‘trust-no-one, assume nothing’ mantra is also a great tool to mitigate potential attacks.
Derek Manky's picture
Organizations can strengthen their security posture by getting detailed information on current attack techniques and keeping their employees’ cyber hygiene training up to date.
Marc Solomon's picture
Security orchestration is about getting multiple systems in the Security Operations Center (SOC) to work together so you can detect, remediate and respond across the infrastructure.
John Maddison's picture
Digital acceleration, user demand, and shifting business strategies add new edges to the network, making it increasingly difficult to manage and even harder to secure.
Derek Manky's picture
Linux is becoming a more popular target for attackers as it operates the back-end systems of many networks and container-based solutions for IoT devices and mission-critical applications.