Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

There were seven times more distributed denial (DDoS) attacks larger than 300 Gbps (gigabit per second) observed during the first six months of 2018 compared to the first half of 2017, NETSCOUT Arbor reveals. [Read More]
Google has shared more details on the recently released Shielded VMs, a new offering designed for securing workloads running on the Google Cloud Platform (GCP). [Read More]
Let’s Encrypt root, ISRG Root X1, is now trusted by all major root programs, including Microsoft, Google, Apple, Mozilla, Oracle, and Blackberry. [Read More]
Facebook announced the open source availability of Fizz, a TLS library written in C++ 14 that includes the new generation of Transport Layer Security (TLS 1.3). [Read More]
Facebook has asked major US banks to share customer data to allow it to develop new services on the social network's Messenger texting platform, a banking source told reporters. [Read More]
Security researchers looking to find bugs in Firefox should not worry about Mozilla suing them, the Internet organization says. That is, of course, as long as they don’t mess with user data. [Read More]
Duo Security creates open source tools and discloses techniques for identifying large-scale Twitter botnets – based on the analysis of 88 million accounts and over half-a-billion tweets [Read More]
Cisco will pay $2.35 billion in cash to acquire cloud-based identity and access management solutions provider Duo Security. [Read More]
The DHS National Cybersecurity Summit will bring together a diverse group of stakeholders across government, industry, and academia to reinforce DHS’s collective defense mission and its commitment to working across a wide range of industries and sectors to protect national critical functions. [Read More]
Mozilla has reaffirmed its commitment to distrust all Symantec certificates starting in late October 2018, when Firefox 63 is set to be released to the stable channel. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Steven Grossman's picture
The typically fragmented “best of breed” security architecture of many large enterprises results in protective gaps, vendor management challenges and finger pointing.
Stan Engelbrecht's picture
The principles of automation and orchestration are necessary to counter the skills and resource gap, and their impact is amplified when applied across the broader picture of cybersecurity, compliance, risk and case management.
Justin Fier's picture
With many companies’ security tools numbering into the dozens, it is hardly surprising that all too often security teams suffer from alert fatigue and burnout – while genuine threats slip through the cracks.
Ashley Arbuckle's picture
What can you do to mitigate the risk you may be inadvertently introducing to your public cloud deployments?
Marie Hattar's picture
Stopping DDoS attacks is not a matter of improving security of IoT devices. Enterprises need to take responsibility and be better at identifying and preventing DDoS attacks as they happen in real time.
David Holmes's picture
Forward Secrecy (sometimes called Perfect Forward Secrecy or PFS), is a cryptographic technique that adds an additional layer of confidentiality to an encrypted session, ensuring that only the two endpoints can decrypt the traffic.
Laurence Pitt's picture
The rapid proliferation of connected things is leaving networks exposed with more potential entry points that are vulnerable to attack.
Erin O’Malley's picture
SecOps and NetOps are starting to put aside their differences and find ways to work better together. As Gartner reports, these once distinct groups have begun to realize and accept that alignment is not a nice to have, but a business imperative.
Bradon Rogers's picture
While a contract, distributed, partner-oriented workforce and supply chain can create serious risks to your organization, careful implementation of visibility and data protection strategies can help you mitigate many of the risks.
John Maddison's picture
Even though a NOC or a SOC consolidates a variety of tools and measurements into a single management system, they are still too isolated.