Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

IBM releases Adversarial Robustness Toolbox, an open source software library designed to help researchers and developers secure artificial intelligence (AI) systems [Read More]
A technical alert issued by the US and UK details how Russian state-sponsored hackers target government and private-sector organizations by abusing various networking protocols [Read More]
McAfee announced two additions to its cloud security program, and published a new analysis of the corporate adoption of cloud services. [Read More]
U.S. Energy Department announces funding opportunity for research and development of cybersecurity technologies designed to protect energy infrastructure against attacks [Read More]
IBM adds intelligent orchestration capabilities to incident response platform and launches new threat and vulnerability management service [Read More]
Cisco Talos researchers find 17 vulnerabilities in Moxa industrial routers, including many high severity command injection and DoS flaws [Read More]
Application security firm Onapsis has raised $31 million through a Series C funding, bringing the total amount raised by the company to $62 million. [Read More]
Cloudflare launches Spectrum, a new service designed to extend the company’s DDoS and other protections to gaming, remote access, email and other services [Read More]
The 2016 data breach that Uber made public in November 2017 impacted over 25 million riders and drivers in the United States, the Federal Trade Commission (FTC) reveals. [Read More]
PowerHammer attack allows hackers to stealthily exfiltrate data from air-gapped computers using power lines [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Erin O’Malley's picture
Designed for specific purposes, security tools should be fed only the data they need to do what they do best; they shouldn’t be burdened with irrelevant data.
Lance Cottrell's picture
Net Neutrality holds that the internet should be a passive conduit for data between any endpoints. It should not make any difference to a carrier who is initiating the connection and what service they are using.
Torsten George's picture
Unfortunately, the Cyber Shield Act as it stands falls short, since it is a voluntary program that does not incentivize vendors to implement the NIST security standards.
Marie Hattar's picture
Enterprises need to rethink security to focus less on the perimeter and more on identifying anomalies in user and network behavior that may be indicators of an attack in progress.
Marc Solomon's picture
With the right technologies and/or services, every organization can get relevant, prioritized threat intelligence how, when and where they need it.
Ashley Arbuckle's picture
While it’s easy to deploy new IT services, many of the security tools and processes that we’ve used in our networks and data centers will not work in public clouds.
John Maddison's picture
Digital transformation is creating a whole new set of risks that, especially where critical infrastructure is involved, could have potentially devastating consequences.
Scott Simkin's picture
Blending in with legitimate users, attackers can infiltrate organizations and dwell inside networks for months or even years without being detected.
Marc Solomon's picture
There are four primary threat intelligence models that businesses employ today – from one to one to many to many. Let’s take a closer look at each.
Torsten George's picture
To limit exposure to privileged credential attacks, organizations need to rethink their enterprise security strategy and move to an identity-centric approach based on a Zero Trust model.