Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Weak security measures in place at several major wireless carriers in the United States make it easy for attackers to perform SIM swap attacks on prepaid accounts, a recent study found. [Read More]
British and American officials are meeting as U.K. Prime Minister Boris Johnson's government prepares to decide on whether there's a future for Chinese equipment maker Huawei in the country's next-generation telecom networks. [Read More]
A bill introduced by Senator Tom Cotton would ban the sharing of intelligence with countries that use Huawei technologies in their 5G networks. [Read More]
The FBI asked Apple to help extract data from iPhones that belonged to the Saudi aviation student Mohammed Alshamrani, who fatally shot three sailors at a U.S. naval base in Florida. [Read More]
MITRE released a version of its ATT&CK knowledge base that is specifically designed for industrial control systems (ICS). [Read More]
Facebook, Samsung and Ring have unveiled new or improved privacy and security tools at CES 2020. [Read More]
Firefox 72 will provide users with an option to delete telemetry data in response to California’s Consumer Privacy Act (CCPA), Mozilla says. [Read More]
Serious vulnerabilities found by a researcher in Cisco Data Center Network Manager can be chained for high-impact attacks. [Read More]
An unprotected database exposed the data of all Wyze users who created an account before December 26, 2019. [Read More]
ProtonMail releases beta version of ProtonCalendar, a fully encrypted calendar application that aims to help users keep track of their plans and keep their data private. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Torsten George's picture
Securing multi-cloud and hybrid environments creates an unfamiliar situation for many organizations, in which they’re unsure of who is responsible for controlling access to and securing the underlying infrastructure.
Craig Harber's picture
Cybersecurity teams need actionable insight into the latest techniques, tactics and procedures being used by attackers and a continuous understanding of their environment and anomalous behavior.
Marc Solomon's picture
Having a platform that serves as a central repository allows you to aggregate internal threat and event data with external threat feeds and normalize that data so that it is in a usable format.
Preston Hogue's picture
Every piece of hardware, every integration, every API, every process, as well as applications themselves, are potential targets.
Laurence Pitt's picture
The best way to stay ahead of threats while enabling business agility to keep up with the latest technology advances is to look to the network as the first line of defense.
Justin Fier's picture
The arrival of 5G will fuel an explosion of never-before-seen IoT machines, introducing uncharted vulnerabilities and opening the door for cyber-criminals to compromise our increasingly intertwined cities.
Craig Harber's picture
Because attackers will exploit the paths of least resistance and move laterally through the enterprise, visibility must include all managed and unmanaged assets (enterprise IoT, shadow IoT, legacy systems, etc.)
John Maddison's picture
Security-Driven Networking is a new, strategic approach to security that enables the seamless expansion of network environments and services without ever compromising on security.
Jim Ducharme's picture
In just about every case of digital identity, there seems to be a set of credential recovery mechanisms that are weaker than the authentication method itself.
Torsten George's picture
Organizations should recognize that not all authenticators are equally vulnerable to the mechanisms used to break the trust chain, which range from simple guesswork to coercion.