Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

T-Mobile notifies some prepaid customers that their personal information was accessed by hackers. [Read More]
Israel-born startup Intsights has raised $30 million in a Series D funding, bringing the total amount raised by the company to more than $70 million. [Read More]
Data protection provider Clumio completes a $135 million Series C funding round, which brings the total raised by the company to $186 million. [Read More]
IBM launches Cloud Pak for Security, a solution designed to help organizations hunt for threats by bringing together security data from multiple tools and clouds. [Read More]
Amnesty International issued a scathing indictment of the world’s dominant internet corporations, arguing in a new report that Google and Facebook should be forced to abandon what it calls their surveillance-based business model because it is “predicated on human rights abuse.” [Read More]
ZecOps, a San Francisco-based threat detection and security automation company, has secured a total of $10.2 million through a seed funding round. [Read More]
The proposed "National Security and Personal Data Protection Act of 2019" aims to put a stop to the flow of Americans’ sensitive personal data to countries that threaten national security. [Read More]
NSA publishes advisory to provide information on possible mitigations for risks associated with Transport Layer Security Inspection (TLSI). [Read More]
Trend Micro announces Cloud One, a new security services platform aimed at helping customers simplify hybrid and multi-cloud security. [Read More]
Microsoft this week revealed plans to adopt DNS over HTTPS (DoH) in Windows 10 in an attempt to keep user traffic as private as possible. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Jim Ducharme's picture
In just about every case of digital identity, there seems to be a set of credential recovery mechanisms that are weaker than the authentication method itself.
Torsten George's picture
Organizations should recognize that not all authenticators are equally vulnerable to the mechanisms used to break the trust chain, which range from simple guesswork to coercion.
Laurence Pitt's picture
Adoption of 5G not only exposes potential new attack surfaces, but given execution happens at super-speed, it also changes the required nature of any defense.
John Maddison's picture
A single, cross-platform security strategy ensures that your cloud security deployment doesn’t replicate the challenges of complexity, siloed solutions, and solution sprawl faced in traditional network security environments.
Gunter Ollmann's picture
The faster in-house network administrators can transition to becoming public cloud network security engineers, architects, or analysts, the faster their organizations can implement digital transformation.
Jim Gordon's picture
The decisions platform companies make have profound impacts on every single CISO on the planet, and we need more CISOs speak up. If your enterprise has the opportunity to engage with platform companies– do so.
Jim Ducharme's picture
Now is the time to evaluate what methods of authentication will best serve your organization on the path to a passwordless future.
Preston Hogue's picture
Applications have been deconstructed to the point where we need to think about them with a new level of abstraction to understand how security needs to evolve.
Seema Haji's picture
Enormous bandwidth increases of 5G, the rapid expansion of edge computing and countless new IoT devices introduce risk despite their intended benefit.
John Maddison's picture
Many cybersecurity companies claim to have introduced AI capabilities into their solutions, but most fall short of true AI because their underlying infrastructure is too small or their learning models are incomplete.