Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Safari does use Tencent to ensure that users in China do not navigate to malicious websites, but it never sends the actual URL of a visited site to the Chinese company, Apple says. [Read More]
With increasing use and familiarity with the cloud and its opportunities, the threat of Shadow IT is growing and needs to be tackled, but without destroying the benefit. [Read More]
Starting today, October 15, users in the United States have a new 2FA method at their disposal in the form of Google’s USB-C Titan Security Key. [Read More]
A critical vulnerability patched by Sophos in its Cyberoam firewall appliances allows a remote, unauthenticated attacker to execute arbitrary commands with root privileges. [Read More]
Starting with its next stable release, Tor (The Onion Router) browser will reject End-Of-Life relays by default, the Tor Project has announced. [Read More]
The European Union hinted strongly it viewed Chinese tech group Huawei as a security risk to its roll-out of 5G networks in a report. [Read More]
The key to mitigating Pass the Hash attacks is the issuance of single-use passwords for privileged accounts. [Read More]
A group of cybersecurity companies launch the Open Cybersecurity Alliance (OCA), a joint effort focused on the development of open source security technologies. [Read More]
A critical remote code execution vulnerability in several D-Link routers that reached their end of life remains unpatched. [Read More]
NIST has published a draft Zero Trust Architecture (ZTA) special publication (SP.800.207) to develop a technology-neutral lexicon of the logical components of a zero trust strategy. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

John Maddison's picture
A single, cross-platform security strategy ensures that your cloud security deployment doesn’t replicate the challenges of complexity, siloed solutions, and solution sprawl faced in traditional network security environments.
Gunter Ollmann's picture
The faster in-house network administrators can transition to becoming public cloud network security engineers, architects, or analysts, the faster their organizations can implement digital transformation.
Jim Gordon's picture
The decisions platform companies make have profound impacts on every single CISO on the planet, and we need more CISOs speak up. If your enterprise has the opportunity to engage with platform companies– do so.
Jim Ducharme's picture
Now is the time to evaluate what methods of authentication will best serve your organization on the path to a passwordless future.
Preston Hogue's picture
Applications have been deconstructed to the point where we need to think about them with a new level of abstraction to understand how security needs to evolve.
Seema Haji's picture
Enormous bandwidth increases of 5G, the rapid expansion of edge computing and countless new IoT devices introduce risk despite their intended benefit.
John Maddison's picture
Many cybersecurity companies claim to have introduced AI capabilities into their solutions, but most fall short of true AI because their underlying infrastructure is too small or their learning models are incomplete.
Jim Ducharme's picture
If you want to succeed with FIDO, you have to be ready. Now is the time to assess your organization’s authentication needs, how they are evolving, and the dynamics of your user population.
Jim Gordon's picture
Individuals and security professionals should have a 360 mindset and know the actions needed to take in the pursuit of data protection and the preservation of privacy.
Ashley Arbuckle's picture
While we can’t turn our attention away from gathering data, we must devise new ways to deal with the onslaught of data. Humans simply can’t keep up, and the problem is getting worse.