Security Experts:

Security Infrastructure
long dotted


Reddit this week decided to lock down some of its users’ accounts, after detecting unusual activity on those accounts. [Read More]
Imperva researchers discovered that the powerful packet manipulation tool Scapy is affected by a DoS vulnerability. [Read More]
Transmute is targeting larger enterprises with customized solutions for streamlining identity verification and management. [Read More]
Sophos acquires Avid Secure, a cloud infrastructure security company only founded just over one year ago. [Read More]
U.S. Senators Marco Rubio (R-FL) and Mark R. Warner (D-VA) have introduced a bi-partisan bill aimed at protecting U.S. technology and economic supremacy. [Read More]
Radware announced plans to acquire bot management company ShieldSquare for an undisclosed sum. [Read More]
Akamai acquires Janrain, a company specializing in customer identity and access management (CIAM) solutions. [Read More]
BlackBerry is licensing its security technology to IoT device manufacturers. A BlackBerry survey of 4,000 people in the US, UK and Canada shows that most don’t trust Internet-connected devices. [Read More]
Industry professionals comment on hackers leaking information on hundreds of German politicians and celebrities. [Read More]
Germany’s IT security agency on Saturday defended its response to the leaking of hundreds of politicians’ private information, after lawmakers accused it of failing to inform them quickly enough. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Marie Hattar's picture
A big part of making autonomous driving accessible will be the ability for car makers and suppliers to secure the networks that power these increasingly sophisticated vehicles.
Travis Greene's picture
A Consumer Identity and Access Management (CIAM) approach can help your security organization gain a reputation as a business partner that drives heightened user experiences and business competitiveness.
John Maddison's picture
Given the growth of sophisticated and pervasive threats and malware, extra caution must be taken to compensate for the security protections inherent in traditional MPLS connections.
Torsten George's picture
Instead of relying solely on passwords, security professionals should consider implementing a Zero Trust approach to identity and access management based on the following best practices.
Laurence Pitt's picture
The biggest truth about security in public cloud is that it provides security at scale. As a single organization, everything you do is at a scale of one.
Stan Engelbrecht's picture
These seven processes should be automated in order to save valuable time during incident response and security investigation procedures, and help organizations improve their overall cybersecurity posture.
John Maddison's picture
To ensure that your existing IPS solution doesn’t become a weak link in your security strategy, you should be constantly tracking and evaluating its effectiveness—especially older, legacy solutions.
Torsten George's picture
By implementing these measures organizations can limit their exposure to remote access-based cyber threats, while supporting agile business models such as remote work and outsourced IT.
Laurence Pitt's picture
By paying just a bit more attention to the permissions you are allowing on your phone or computer, you could protect yourself from a much more significant headache down the road.
Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.