Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Minneapolis-based identity firm Entrust Datacard has acquired Barcelona, Spain firm Safelayer Secure Communications. Financial details were not been disclosed. [Read More]
A default account exposes Cisco Small Business switches to remote attacks. No patch available, but there is a workaround [Read More]
Microsoft releases guidance on enforcing software encryption in Windows after researchers break the full-disk encryption feature of popular SSDs [Read More]
BehavioSec adds new features to Behavioral Biometrics Platform, including global profiling, detection of obfuscated origin, and docker container support [Read More]
Over the past years, China Telecom has been constantly misdirecting Internet traffic through China, researchers say. [Read More]
VMware announces new service designed to help enterprises use permissioned blockchain [Read More]
Britain's data commissioner Elizabeth Denham called for tougher rules governing the use of personal data by political campaigns around the world. [Read More]
The encryption mechanism used by several types of solid state drives contains vulnerabilities that an attacker could exploit to access encrypted data without knowing a password. [Read More]
Private equity investment firm Thoma Bravo acquires Veracode from Broadcom for $950 million in cash [Read More]
Symantec acquires mobile application security firm Appthority and Javelin Networks, a company specializing in Active Directory (AD) security [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Marie Hattar's picture
A big part of making autonomous driving accessible will be the ability for car makers and suppliers to secure the networks that power these increasingly sophisticated vehicles.
Travis Greene's picture
A Consumer Identity and Access Management (CIAM) approach can help your security organization gain a reputation as a business partner that drives heightened user experiences and business competitiveness.
John Maddison's picture
Given the growth of sophisticated and pervasive threats and malware, extra caution must be taken to compensate for the security protections inherent in traditional MPLS connections.
Torsten George's picture
Instead of relying solely on passwords, security professionals should consider implementing a Zero Trust approach to identity and access management based on the following best practices.
Laurence Pitt's picture
The biggest truth about security in public cloud is that it provides security at scale. As a single organization, everything you do is at a scale of one.
Stan Engelbrecht's picture
These seven processes should be automated in order to save valuable time during incident response and security investigation procedures, and help organizations improve their overall cybersecurity posture.
John Maddison's picture
To ensure that your existing IPS solution doesn’t become a weak link in your security strategy, you should be constantly tracking and evaluating its effectiveness—especially older, legacy solutions.
Torsten George's picture
By implementing these measures organizations can limit their exposure to remote access-based cyber threats, while supporting agile business models such as remote work and outsourced IT.
Laurence Pitt's picture
By paying just a bit more attention to the permissions you are allowing on your phone or computer, you could protect yourself from a much more significant headache down the road.
Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.