Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

AWS has reached out to customers reportedly targeted by the Capital One hacker, but says none of them reported any significant issues. [Read More]
Researchers discovered that organizations expose many confidential documents by uploading them to malware analysis sandboxes. [Read More]
Google’s Password Checkup extension warns users if their password has been compromised, but many don’t change their password after being alerted. [Read More]
The latest update released by Mozilla for Firefox patches a vulnerability that can be exploited to bypass the master password of the built-in password manager and obtain stored passwords. [Read More]
A database of personal information has been found on an unsecured server that includes vast numbers of biometric records. [Read More]
British Airways (BA) has been criticized for allowing hackers easy access to customer flight information via a vulnerability affecting its e-ticketing system. [Read More]
The Mutually Agreed Norms for Routing Security (MANRS) project launches Observatory, a free tool designed to help network operators improve routing security. [Read More]
McAfee acquires NanoSec to strengthen the container security capabilities of its MVISION Cloud and MVISION Server Protection products. [Read More]
Broadcom agreed to acquire the enterprise unit of cybersecurity firm Symantec Corp. for $10.7 billion in a move to further diversify the US semiconductor maker. [Read More]
Cisco released patches to address several vulnerabilities in its Small Business 220 Series Smart Switches, including two bugs rated Critical severity. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Jim Gordon's picture
Individuals and security professionals should have a 360 mindset and know the actions needed to take in the pursuit of data protection and the preservation of privacy.
Ashley Arbuckle's picture
While we can’t turn our attention away from gathering data, we must devise new ways to deal with the onslaught of data. Humans simply can’t keep up, and the problem is getting worse.
Preston Hogue's picture
The best way for the security industry to meet the challenge of modern applications and modern app development is to adopt a modern way of supporting those from a security perspective.
Justin Fier's picture
As executives, developers, security teams, and third-party vendors struggle to exert their influence on digital transformation, threat-actors are exploiting the chaos for their own gain.
Ashley Arbuckle's picture
Breach and Attack Simulation (BAS) tools aid in maintaining a fundamental level of security assurance more quickly and cost effectively than traditional approaches.
John Maddison's picture
Analyzing threat trends can provide security professionals with insights into how to better protect their organizations from the latest cyber threats.
Gunter Ollmann's picture
While cloud SIEM may be new for most organizations, its ability to harness the innate capabilities of public cloud are transforming security operations.
Jim Ducharme's picture
It’s time to address some myths about how facial recognition works, to help increase consumer comfort with biometric-authentication technology.
Laurence Pitt's picture
While security spending is on the increase, it’s up to us as experienced security practitioners to make the most of this spend with a clear ROI that can be reported to the business.
Alastair Paterson's picture
If it takes a whole village to raise a child, it takes a whole community of vendors and business partners to build a secure data environment.