Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Security researchers document vulnerabilities in AWS CloudFormation and AWS Glue that could be abused to leak sensitive files and access other customer’s data. [Read More]
Several tech giants issued statements after attending the White House meeting on open source software security. [Read More]
Federal Communications Commission (FCC) Chairwoman Jessica Rosenworcel proposes strengthening rules around telecom providers’ reporting of data breaches. [Read More]
Adversarial AI – or the use of artificial intelligence and machine learning within offensive cyber activity – comes in two flavors: attacks that use AI and attacks against AI. [Read More]
Apple ships iOS fix for a persistent HomeKit denial-of-service flaw but only after an independent researcher publicly criticized the company for ignoring his discovery. [Read More]
Mozilla fixes multiple high-severity vulnerabilities with the release of Firefox 96, Firefox ESR 91.5, and Thunderbird 91.5. [Read More]
Eureka has emerged from stealth mode with a cloud data security posture management platform and $8 million in seed funding. [Read More]
Microsoft’s first batch of patches for 2022 cover at least 97 security flaws, including a critical HTTP Protocol Stack bug described as “wormable.” [Read More]
Research shows the “Great Resignation” phenomenon is accompanied by a “Great Exfiltration” as people leave their jobs and take company data with them. [Read More]
A vulnerability in the NetUSB kernel module could allow remote attackers to execute code on millions of vulnerable devices. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Laurence Pitt's picture
We have had to accelerate into remote and now hybrid working models over the last year and a half. Now that we are getting back to work, there is still much to do as everything moves fast.
Marc Solomon's picture
Evolving our definition of detection to encompass greater breadth and depth of understanding through internal and external data aggregation, correlation and investigation, delivers the information we need to execute faster with confidence.
Laurence Pitt's picture
The flexible and secure nature of the cloud allows security and application teams to focus on defining strategy for the future rather than being consumed by the management of what is in place today.
John Maddison's picture
Trying to keep track of the who, what, when, where, and how of today’s network has broken the backs of many SecOps teams.
Torsten George's picture
Until organizations start implementing identity-centric security measures, account compromise attacks will continue to provide an easy entree for data breaches.
Marie Hattar's picture
5G and 6G networks will have a significantly larger attack surface than their predecessors, thanks to innovations in IoT, virtualized networks, and open source technologies.
William Lin's picture
The big opportunity we have post-pandemic is the “big reset”: every security and IT team’s chance to completely re-think their security programs.
Marc Solomon's picture
Extended Detection and Response (XDR) is the latest buzz word in the security industry and, as with any new technology development, in the early days there is a lot of confusion.
Laurence Pitt's picture
Supporting and securing systems now operating in a hybrid model with remote working still normal but staff also slowly returning to the office, the risk of cyberattack increases.
Marie Hattar's picture
Security is never static, and networks will always be evolving, so make sure you’re continuously validating your security posture and ready for whatever comes next.