Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Cisco has confirmed that tens of its enterprise routers and switches are impacted by four bypass vulnerabilities in Layer-2 (L2) network security controls. [Read More]
Recent high-profile cyberattacks have demonstrated the effectiveness of an interesting method for getting past MFA. [Read More]
SentinelLabs researchers are kick-starting a crowdsourced effort to understand a new mysterious APT hitting hitting telcos, ISPs and universities in the Middle East and Africa. [Read More]
GuidePoint Security launches industrial control systems (ICS) security service offerings, including security program review and penetration testing. [Read More]
A class action lawsuit filed against Samsung alleges that the company unnecessarily collected user data, then stored and sold it without proper security protections. [Read More]
The Ukrainian government is proactively warning that Russia is planning “massive cyberattacks” against critical infrastructure targets in the energy sector. [Read More]
The Australian government is considering tougher cybersecurity rules for telecommunications companies and blamed wireless carrier Optus, for a massive breach of personal data from 9.8 million customers. [Read More]
Microsoft has dismantled a malicious campaign in which OAuth applications deployed on compromised cloud tenants were used to distribute spam messages. [Read More]
Chainguard announces Wolfi, a stripped-down Linux OS distribution designed to improve the security of the software supply chain. [Read More]
Twitter has logged out some users from their accounts after learning of a security issue related to password resets. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

John Maddison's picture
By integrating with native security services on major cloud platforms, a CNP solution can effectively correlate security findings to pinpoint risks and recommend effective mitigation.
William Lin's picture
AppSec is key to protecting production workloads from modern threats, but there are still too many silos and too much friction in existing implementations.
John Maddison's picture
Universal ZTNA is the easiest and most effective way to ensure that every user and device has secure access to the applications they need to do their jobs.
Gordon Lawson's picture
Zero trust is a great way to approach security, but we need to change the paradigm to prevent threats, instead of just detecting them.
Joshua Goldfarb's picture
By understanding how to identify, isolate, and remove unwanted bot and fraud traffic, enterprises can remove the noise clouding the visibility they have into their online applications.
Laurence Pitt's picture
A well-implemented ZTNA with the ‘trust-no-one, assume nothing’ mantra is also a great tool to mitigate potential attacks.
Derek Manky's picture
Organizations can strengthen their security posture by getting detailed information on current attack techniques and keeping their employees’ cyber hygiene training up to date.
Marc Solomon's picture
Security orchestration is about getting multiple systems in the Security Operations Center (SOC) to work together so you can detect, remediate and respond across the infrastructure.
John Maddison's picture
Digital acceleration, user demand, and shifting business strategies add new edges to the network, making it increasingly difficult to manage and even harder to secure.
Derek Manky's picture
Linux is becoming a more popular target for attackers as it operates the back-end systems of many networks and container-based solutions for IoT devices and mission-critical applications.