Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Verodin, a company that provides a platform for assessing the effectiveness of security products, raises $21 million in Series B funding round [Read More]
Researchers find a way to stealthily manipulate road navigation systems. Successful test attacks conducted against users in China and US [Read More]
GitHub adds support for Python to its security alerts feature, which notifies developers if their packages contain vulnerabilities [Read More]
Timehop has shared more details on the recent data breach, including what the hacker did on its systems and what other type of information was compromised [Read More]
AT&T has agreed to acquire San Mateo, Calif.-based threat management and intelligence firm AlienVault for an undisclosed sum. [Read More]
Department of Defense (DoD) IT managers say the DoD needs to improve the use of cloud to maintain the military’s technical advantage and support mission success. [Read More]
Britain's Information Commissioner's Office (ICO) plans to issue Facebook with the maximum available fine for breaches of the Data Protection Act -- an equivalent of $660,000 or 566,000 euros. [Read More]
A CredSSP vulnerability affecting all versions of Windows and patched recently by Microsoft has been found to impact Pepperl+Fuchs HMI devices [Read More]
An ex-Apple engineer was charged with stealing secrets from a hush-hush self-driving car technology project days before he quit to go to a Chinese startup. [Read More]
Private equity investment firm Thoma Bravo said it will acquire a majority interest in identity and access management (IAM) solutions firm Centrify. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

John Maddison's picture
Analysis of a vendor’s underlying design and optimization approaches will enable you to select the solution that best meets your organization’s performance and budgetary requirements.
Joshua Goldfarb's picture
In security, one of our goals should always be to broaden our perspective, field of view, and horizons to minimize the risk that we will be blindsided by something we didn’t see coming.
Josh Lefkowitz's picture
It’s imperative that security practitioners acknowledge the often-confusing nature of insider threat, seek to dispel misconceptions, and provide clear, accurate insight whenever possible.
Joshua Goldfarb's picture
When an organization controls its security technology portion size, it enables the organization to better address strategic requirements and to work far more efficiently.
Steven Grossman's picture
The typically fragmented “best of breed” security architecture of many large enterprises results in protective gaps, vendor management challenges and finger pointing.
Stan Engelbrecht's picture
The principles of automation and orchestration are necessary to counter the skills and resource gap, and their impact is amplified when applied across the broader picture of cybersecurity, compliance, risk and case management.
Justin Fier's picture
With many companies’ security tools numbering into the dozens, it is hardly surprising that all too often security teams suffer from alert fatigue and burnout – while genuine threats slip through the cracks.
Ashley Arbuckle's picture
What can you do to mitigate the risk you may be inadvertently introducing to your public cloud deployments?
Marie Hattar's picture
Stopping DDoS attacks is not a matter of improving security of IoT devices. Enterprises need to take responsibility and be better at identifying and preventing DDoS attacks as they happen in real time.
David Holmes's picture
Forward Secrecy (sometimes called Perfect Forward Secrecy or PFS), is a cryptographic technique that adds an additional layer of confidentiality to an encrypted session, ensuring that only the two endpoints can decrypt the traffic.