Security Experts:

Security Infrastructure
long dotted


Microsegmentation provider Edgewise Networks has secured $11 million in new funding round. To date, the company has raised $18 million. [Read More]
Microsoft wants to make its Windows platform passwordless and the latest Windows 10 release marks one step closer to that goal. [Read More]
San Jose, Calif-based network threat detection and response firm Vectra has closed a $100 million Series E funding round led by TCV and supported by existing investors. [Read More]
Customs and Border Protection says photos of travelers and license plates collected at a single U.S. border point have been exposed in a malicious cyberattack in what a leading congressman called a “major privacy breach.” [Read More]
The GoldBrute botnet is launching brute-force attacks against Windows severs with the remote desktop protocol (RDP) exposed to the Internet. [Read More]
A BGP route leak resulted in large portions of European Internet traffic being routed through China Telecom’s network for two hours on June 6, 2019. [Read More]
The new Federal Data Strategy changing the way U.S. Government agencies use data to improve operations and deliver services as well as making it easier for citizens and businesses to access and use data to spur the economy. [Read More]
macOS 10.15 Catalina brings several security-related improvements, including an enhanced Gatekeeper, a dedicated read-only volume for the OS, data protections, and support for Activation Lock. [Read More]
Cisco has found several vulnerabilities, including one code execution flaw, in its Industrial Network Director product. [Read More]
Experts say that deception technology works and it’s one of the last bastions of active asymmetrical defense that we have to help blue teams start to gain ground on defending their organizations. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Torsten George's picture
Companies should consider moving to a Zero Trust approach, powered by additional security measures such as multi-factor authentication, to stay ahead of the security curve and leave passwords behind for good.
Laurence Pitt's picture
“The Cloud Wars” may be dominating IT news headlines, but what does this phrase actually mean? And is it something that an enterprise needs to be concerned with?
Gunter Ollmann's picture
To the surprise of many, public cloud appears to be driving a renaissance in adoption and advancement of managed security service providers (MSSP).
Jim Ducharme's picture
The ultimate goal for identity and access management (IAM) is not to find the unbreakable or “unhackable” code for authentication; rather, it’s to layer security to create a much stronger identity assurance posture.
Joshua Goldfarb's picture
Despite all of the money pumped into security on an annual basis, many of the same issues and challenges persist from year to year.
Preston Hogue's picture
If done right and integrated throughout the process, security ends up being not a source of friction, but a function that protects the business, at the speed of business.
Torsten George's picture
Using Zero Trust Privilege services can extend corporate security policies and best practices to cloud environments, while reducing costs, improving scalability across multi-VPCs, -SaaS, and -directory environments, and minimizing security blind spots through centralized management.
Danelle Au's picture
Deep learning is an ideal technology to address the volume and velocity of the current threat environment, and can be used to detect a variety of different threats, even ones that seemingly look novel.
John Maddison's picture
Enabling the networks of tomorrow requires organizations to radically reimagine the security solutions they have in place today.
Ashley Arbuckle's picture
With a holistic approach you can enable efficient segmentation across your infrastructure, identify anomalies faster by using process behavior deviations, and reduce your attack surface quickly.