Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Republican senators have introduced what they have described as a “balanced” bill that would require tech companies to give law enforcement access to encrypted data. [Read More]
Companies believe strong authentication is important, but they still over-rely on passwords and allow their employees to access corporate resources via social media credentials. [Read More]
A top German court has ordered Facebook to stop merging data collected through its Whatsapp and Instagram subsidiaries or other websites unless users explicitly agree, in a legal victory for competition authorities. [Read More]
Microsoft president Brad Smith on Tuesday said Europe was the global leader on setting rules for big tech, two years after the EU implemented the GDPR, its landmark data privacy law. [Read More]
Twitter has informed business users that their billing information may have been exposed through their web browser’s cache. [Read More]
Applying micro-segmentation to endpoints can help stop attackers from moving laterally within an organization after the initial breach. [Read More]
The United States is taking additional steps toward serving .gov domains over encrypted connections, and this week laid out plans to preload the entire top-level domain (TLD). [Read More]
Apple has announced several new privacy and security features at its 2020 Worldwide Developers Conference (WWDC). [Read More]
BlueLeaks: Distributed Denial of Secrets has leaked hundreds of thousands of files belonging to over 200 law enforcement agencies, obtained by Anonymous hackers from a web development firm. [Read More]
Microsoft has announced improved identity and access management protections for AccountGuard users in the United States, ahead of the 2020 elections. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Laurence Pitt's picture
For an MSP looking to grow business, the convergence of SD-WAN and security, along with the transitional needs of customers, translates to opportunity.
Torsten George's picture
With IT budgets being cut back in response to the economic contraction caused by the current health crisis, security teams need to deliver more with less.
Marie Hattar's picture
Organizations should regularly put security products, processes and people to the test, and the reward is better, more efficient protection against attacks.
John Maddison's picture
Network connections that can change instantaneously in response to shifting business requirements can take a security solution minutes or hours to be reconfigured. And that lag time is prime for exploitation.
Laurence Pitt's picture
Working remotely should be a positive experience. Here are a few simple suggestions that may help during this time of change.
Torsten George's picture
Static passwords lack the ability to verify whether the user accessing data is authentic or just someone who bought a compromised password.
Marc Solomon's picture
It’s up to humans, guided by instinct, intelligence and experience, to determine the right data, so they can focus on what matters to the organization, make better decisions and take the right actions.
Craig Harber's picture
Many organizations are not aware that their network sensors are improperly or inefficiently deployed because they do not have a full understanding of how to act on the network traffic being collected.
Gunter Ollmann's picture
The philosophy of integrating security practices within DevOps is obviously sensible, but by attaching a different label perhaps we are likely admitting that this “fusion” is more of an emulsification.
John Maddison's picture
A security platform is much more than just wrapping a collection of security tools together into a single bundle and then adding some sort of a shell script so independent management tools appear to be part of a congruent solution.