Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Going after high profile victims appears to have allowed Ryuk ransomware operators to build a highly lucrative malware enterprise. [Read More]
WhatsApp on Friday postponed a data-sharing change as users concerned about privacy fled the Facebook-owned messaging service and flocked to rivals Telegram and Signal. [Read More]
The Canadian data security startup closes a Series A funding round to expand its data discovery and classification offerings. [Read More]
The company sued two individuals for using browser extensions to scrape user profiles and other information from its website. [Read More]
The NSA issues guidance on the use of DNS over HTTPS (DoH), which encrypts DNS requests to improve privacy. [Read More]
According to a Wall Street Journal report, TikTok used a banned tactic to bypass the privacy safeguard in Android to harvest unique identifiers from millions of mobile devices. [Read More]
The agency says poor cyber hygiene practices lead to compromise via cloud services. [Read More]
More than 70 vulnerabilities affecting small business routers from Cisco will not receive patches as they have reached end of life. [Read More]
Any EU country can take legal action against companies like Facebook over cross-border violations of data privacy rules, not just the main regulator in charge of the company. [Read More]
The stolen documents were related to Pfizer and BioNTech’s COVID-19 vaccine candidate. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Marc Solomon's picture
To push security operations forward, we must move towards a single, collaborative environment that can include threat hunters, incident handlers and threat intelligence and SOC analysts.
Laurence Pitt's picture
In the world of information security, it’s hard to flip between internet browser tabs without hearing a new term, and one of the biggest in 2020 was Secure Access Service Edge (SASE).
Gunter Ollmann's picture
CISOs and their security teams need to quickly master these technologies if they’re to successfully partner with in-house development teams and secure “data-in-use.”
John Maddison's picture
Multi-vendor environments with disparate security solutions that don’t integrate when deployed make it impossible for organizations to securely use the flexible network environments they need to compete effectively.
Tim Bandos's picture
Keeping a ‘six foot distance’ between our digital home life and digital work life can go a long way when it comes to safeguarding our most sensitive data, too.
Torsten George's picture
Ultimately, organizations must assume that bad actors are already in their networks. And consumers must realize they’re constant targets.
AJ Nash's picture
Knowing that threat intelligence is readily available and proving its worth is one thing, understanding how to use it within your security operations program is quite another.
Laurence Pitt's picture
To reap the benefits of 5G and ensure security, organizations must be smarter, fully educated and willing to work alongside the tech.
John Maddison's picture
SD-WAN connections are designed to constantly shift and adjust, replacing one connection that has become unstable with another without interrupting application performance.
Gunter Ollmann's picture
It is reasonable to assume that within five years the term “confidential compute” will become superfluous and an assumed native component of all cloud services.