Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Critical and high-severity vulnerabilities discovered by researchers in F5’s BIG-IP application delivery controller allow a remote attacker to take complete control of a targeted system. [Read More]
Cisco has patched several vulnerabilities affecting various products, including flaws in Small Business routers and switches. [Read More]
Zoom announces the progress it has made in terms of security and privacy, but experts believe the company still faces many challenges. [Read More]
The necessary and dramatic migration to cloud-based tele-health services will undoubtedly leave the industry more exposed in the future. [Read More]
Netgear has started releasing patches for ten vulnerabilities affecting nearly 80 of its products, including flaws disclosed last year at the Pwn2Own hacking contest. [Read More]
An Elasticsearch database pertaining to e-learning platform OneClass was found to expose data on over one million students and lecturers. [Read More]
Threat hunting solutions provider Hunters today announced that it closed a $15 million Series A funding round, which brings the total raised by the company to $20.4 million. [Read More]
Many companies view the SOC as a key part of their security strategy, but SOC staff complain about high stress and the lack of proper tools. [Read More]
IBM has disclosed several vulnerabilities affecting powerline extenders from Tenda and says the vendor has ignored its emails and phone calls. [Read More]
Apple has acquired Fleetsmith, a company that specializes in solutions that automate the setup, patching and security of Macs, iPhones, iPads and Apple TV devices. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

John Maddison's picture
By combining verifiable trust, intent-based segmentation, and integrated security, organizations can establish a trustworthy, security-driven networking strategy.
Jim Ducharme's picture
Let’s look at some real-world examples of the identity management challenges remote work is creating, and at what it means to rethink identity governance and lifecycle to meet those challenges.
Laurence Pitt's picture
Developing an ROI model takes time – my recommendation would be to focus on a simple security project that will return high value to the business when proven successful.
Torsten George's picture
The integration of identity with security is still work in progress, with less than half of businesses having fully implemented key identity-related access controls according to a research study.
Gunter Ollmann's picture
With a diverse and globally distributed workforce, cybersecurity buying decisions will increasingly factor accessibility, usability, and inclusiveness in solution design and operability.
John Maddison's picture
Smart businesses are learning that SD-WAN can play a critical role in quickly—and securely—rolling out new networking environments, and connecting resources and users to data and applications.
Laurence Pitt's picture
Every business is likely to be subject to cyberattacks at some point, and the option is to either take on the cost of putting measures in place before it happens or paying to clean up after.
Torsten George's picture
Today’s economic climate exacerbates risks of insider threats, as pending furloughs or pay cuts may tempt employees to exfiltrate data to secure a new job, make up for income losses, etc.
Gunter Ollmann's picture
CISOs are increasingly partnering with DevOps leaders and vigilantly modernizing secure development lifecycle (SDLC) processes to embrace new machine learning (ML) approaches.
John Maddison's picture
The rate at which recent networking changes have had to occur, and the speed at which cybercriminals have been able to respond, teach us clearly what is needed going forward to ensure ongoing proactive cyber protection.