Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

The latest update released by Mozilla for Firefox patches a vulnerability that can be exploited to bypass the master password of the built-in password manager and obtain stored passwords. [Read More]
A database of personal information has been found on an unsecured server that includes vast numbers of biometric records. [Read More]
British Airways (BA) has been criticized for allowing hackers easy access to customer flight information via a vulnerability affecting its e-ticketing system. [Read More]
The Mutually Agreed Norms for Routing Security (MANRS) project launches Observatory, a free tool designed to help network operators improve routing security. [Read More]
McAfee acquires NanoSec to strengthen the container security capabilities of its MVISION Cloud and MVISION Server Protection products. [Read More]
Broadcom agreed to acquire the enterprise unit of cybersecurity firm Symantec Corp. for $10.7 billion in a move to further diversify the US semiconductor maker. [Read More]
Cisco released patches to address several vulnerabilities in its Small Business 220 Series Smart Switches, including two bugs rated Critical severity. [Read More]
Twitter again admits that it may have shared some ad-related data collected from users with third parties without permission. [Read More]
Achieving a genuine DevSecOps environment is not easy. Speed in code generation (DevOps) is a different requirement to security in code generation, and one can hinder the other. [Read More]
Slack has unveiled new enterprise security tools that give admins more control over who can access Slack and how it can be used. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Alastair Paterson's picture
If it takes a whole village to raise a child, it takes a whole community of vendors and business partners to build a secure data environment.
Preston Hogue's picture
ChatOps offers a bridge to a fully realized vision for DevSecOps, offering a much quicker path to resolution for both security and non-security issues.
Torsten George's picture
Companies should consider moving to a Zero Trust approach, powered by additional security measures such as multi-factor authentication, to stay ahead of the security curve and leave passwords behind for good.
Laurence Pitt's picture
“The Cloud Wars” may be dominating IT news headlines, but what does this phrase actually mean? And is it something that an enterprise needs to be concerned with?
Gunter Ollmann's picture
To the surprise of many, public cloud appears to be driving a renaissance in adoption and advancement of managed security service providers (MSSP).
Jim Ducharme's picture
The ultimate goal for identity and access management (IAM) is not to find the unbreakable or “unhackable” code for authentication; rather, it’s to layer security to create a much stronger identity assurance posture.
Joshua Goldfarb's picture
Despite all of the money pumped into security on an annual basis, many of the same issues and challenges persist from year to year.
Preston Hogue's picture
If done right and integrated throughout the process, security ends up being not a source of friction, but a function that protects the business, at the speed of business.
Torsten George's picture
Using Zero Trust Privilege services can extend corporate security policies and best practices to cloud environments, while reducing costs, improving scalability across multi-VPCs, -SaaS, and -directory environments, and minimizing security blind spots through centralized management.
Danelle Au's picture
Deep learning is an ideal technology to address the volume and velocity of the current threat environment, and can be used to detect a variety of different threats, even ones that seemingly look novel.