Security Experts:

Security Infrastructure
long dotted


Researchers disclose details of new attack method that can be used to decrypt communications. Products from Cisco, Huawei, ZyXEL and Clavister are affected [Read More]
The Internet Engineering Task Force (IETF) publishes Transport Layer Security (TLS) 1.3 as RFC 8446 [Read More]
NetComm patches critical vulnerabilities in 4G LTE Light industrial M2M routers. The flaws can be exploited remotely to completely compromise a device [Read More]
Check Point researchers show how cyber criminals could infiltrate a home or corporate network by exploiting all-in-one printer-fax machines. [Read More]
A recently patched security vulnerability in the Kaspersky VPN application for Android resulted in DNS addresses being exposed. [Read More]
A publicly accessible Amazon S3 bucket was found storing documents apparently detailing GoDaddy infrastructure running in the Amazon AWS cloud, UpGuard reveals. [Read More]
Brand new Mac computers used in enterprise environments can be hacked on the first boot via Apple’s mobile device management (MDM) protocol, researchers show [Read More]
Researchers disclosed the details of two serious vulnerabilities affecting ATM dispenser controllers from NCR. The flaws could have been exploited to install vulnerable firmware and get ATMs to dispense cash [Read More]
Critical vulnerabilities discovered in smart city systems can be exploited by hackers to cause panic, researchers warn [Read More]
High volume of malicious internal reconnaissance and lateral movement observed in the manufacturing industry, reports threat detection firm Vectra [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Torsten George's picture
The Reddit data breach illustrates the importance of rolling out an approach designed to verify the user, validate their device, limit access and privilege, and learn and adapt to new risks.
Alastair Paterson's picture
A confluence of factors is putting hundreds of thousands of implementations of Enterprise Resource Planning (ERP) applications at risk of cyber attacks.
John Maddison's picture
Since access control technologies are usually the first network element that a new device touches, they need to be able to automatically recognize IoT devices.
Marc Solomon's picture
Know your adversaries and yourself are the fundamentals – the first steps of many in the “art of war” with respect to cybersecurity.
Torsten George's picture
Cyber attackers long ago figured out that the easiest way for them to gain access to sensitive data is by compromising an end user’s identity and credentials.
Travis Greene's picture
Privileged Access Management (PAM) can monitor and record user activity to offer misuse deterrence by collecting evidence for prosecution, and can provide more detailed compliance reporting than system logs.
John Maddison's picture
Analysis of a vendor’s underlying design and optimization approaches will enable you to select the solution that best meets your organization’s performance and budgetary requirements.
Joshua Goldfarb's picture
In security, one of our goals should always be to broaden our perspective, field of view, and horizons to minimize the risk that we will be blindsided by something we didn’t see coming.
Josh Lefkowitz's picture
It’s imperative that security practitioners acknowledge the often-confusing nature of insider threat, seek to dispel misconceptions, and provide clear, accurate insight whenever possible.
Joshua Goldfarb's picture
When an organization controls its security technology portion size, it enables the organization to better address strategic requirements and to work far more efficiently.