Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

NIST has announced version 1.0 of its Privacy Framework, a tool designed to help organizations manage privacy risks. [Read More]
Data security startup Cyral has emerged from stealth mode and announced over $15 million in funding, which it plans on investing in R&D and customer support. [Read More]
High-risk users are aware that they are more likely to be targeted by hackers compared to the general population, but many of them still have bad security habits, a Google survey shows. [Read More]
Facebook now alerts users when they interact with a third-party application using Facebook Login. [Read More]
Hundreds of Internet-accessible, unprotected medical imaging systems expose data on millions of patients worldwide, a cybersecurity firm has discovered. [Read More]
P&N Bank has notifed customers of a data breach that resulted in a large amount of sensitive information being compromised. [Read More]
Google has simplified the enrollment process for its Advanced Protection Program and it now allows users to activate a security key on their iPhone. [Read More]
Passwordless multi-factor authentication technology provider Trusona this week announced it has raised $20 million as part of a Series C funding round. [Read More]
Prime Minister Boris Johnson challenged US opponents of Britain's potential decision to let China's Huawei telecoms giant develop its 5G network to come up with a better choice. [Read More]
Dating apps Grindr, OkCupid and Tinder leak personal information to advertising companies in possible violation of European data privacy laws, a consumer group said in a report. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

John Maddison's picture
Outpacing your security capacity with digital innovation is a formula for disaster that may take you out of the running in today’s highly competitive digital marketplace entirely.
Gunter Ollmann's picture
CISOs are increasingly cognizant of the value deep integration of threat intelligence can bring to cloud protection platforms and bottom-line operational budgets.
Torsten George's picture
Perimeter-based security, which focuses on securing endpoints, firewalls, and networks, provides no protection against identity- and credential-based threats.
Preston Hogue's picture
Retailers should ensure that they are proactively scanning for vulnerabilities in the website, as well as deploying a solution to monitor traffic.
Craig Harber's picture
Deep visibility allows organizations to see how different pieces of the overall cyber terrain are communicating with one another, enabling them to highlight potential or existing attack vectors.
Justin Fier's picture
Use of artificial intelligence (AI) will change the role of security teams, and improve companies’ ability to defend their data and networks from future compromises, breaches, and sabotage.
Craig Harber's picture
By using decoys to capture adversary tools, understand their techniques, and detect their actions during early attack phases, security teams can detect problems sooner and avoid long dwell times.
Laurence Pitt's picture
DDoS attacks are moving away from simply sending out broadcast traffic for massive disruption toward more complex and targeted attacks hitting the application layer of the network that can take down specific applications or services.
John Maddison's picture
To build and maintain a secure cyber presence, the best defense is to start with a security-driven development and networking strategy that builds a hardened digital presence from the ground up.
Joshua Goldfarb's picture
Change may not always be on the docket, but when it is, how can we embrace it, understand it, and work to create a constructive environment around it?