Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Google is adding its Password Checkup tool to the Account password manager and Chrome, and it has unveiled some new privacy features for YouTube, Maps and Assistant. [Read More]
The Cyber Security Agency of Singapore (CSA) has published the country’s Operational Technology Cybersecurity Masterplan. [Read More]
Unprotected Cisco WebEx and Zoom meetings can be easily accessed by malicious actors due to an API enumeration vulnerability dubbed Prying-Eye. [Read More]
BlackBerry announces launch of Advanced Technology Development Labs, a new R&D business unit focusing on cybersecurity. [Read More]
An American man who leaked confidential details of thousands of HIV-positive people in Singapore, most of them foreigners, has been jailed in the United States for two years. [Read More]
Threat intelligence firm Anomali unveils Lens, a new tool that makes it easy for organizations to find and use threat data from news articles, blogs, security bulletins, logs and social networks. [Read More]
Arizona transportation officials announced enhanced security measures after thieves were able to order driver's licenses on ServiceArizona.com using little personal information and have them sent to another address. [Read More]
Apple releases security updates for iOS 13 and iPadOS to address a vulnerability that allows third-party keyboard extensions to gain “full access” without being granted permission. [Read More]
Dunkin' Donuts sued by New York's State Attorney General over data breaches that took place in 2015 and 2018. [Read More]
A new report from the United States Government Accountability Office (GAO) shows that the Department of Energy (DOE) has yet to fully analyze the electric grid cybersecurity risks. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Preston Hogue's picture
The best way for the security industry to meet the challenge of modern applications and modern app development is to adopt a modern way of supporting those from a security perspective.
Justin Fier's picture
As executives, developers, security teams, and third-party vendors struggle to exert their influence on digital transformation, threat-actors are exploiting the chaos for their own gain.
Ashley Arbuckle's picture
Breach and Attack Simulation (BAS) tools aid in maintaining a fundamental level of security assurance more quickly and cost effectively than traditional approaches.
John Maddison's picture
Analyzing threat trends can provide security professionals with insights into how to better protect their organizations from the latest cyber threats.
Gunter Ollmann's picture
While cloud SIEM may be new for most organizations, its ability to harness the innate capabilities of public cloud are transforming security operations.
Jim Ducharme's picture
It’s time to address some myths about how facial recognition works, to help increase consumer comfort with biometric-authentication technology.
Laurence Pitt's picture
While security spending is on the increase, it’s up to us as experienced security practitioners to make the most of this spend with a clear ROI that can be reported to the business.
Alastair Paterson's picture
If it takes a whole village to raise a child, it takes a whole community of vendors and business partners to build a secure data environment.
Preston Hogue's picture
ChatOps offers a bridge to a fully realized vision for DevSecOps, offering a much quicker path to resolution for both security and non-security issues.
Torsten George's picture
Companies should consider moving to a Zero Trust approach, powered by additional security measures such as multi-factor authentication, to stay ahead of the security curve and leave passwords behind for good.