Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Doctor Web reports that 10 modifications of the Joker malware that made it to the app store were downloaded by more than 530,000 users. [Read More]
DoControl has emerged from stealth mode with an automated SaaS security platform and more than $13 million in funding. [Read More]
Security startup Randori releases Target Temptation to help pinpoint the ‘attackability’ of the assets in an enterprise network. [Read More]
Veriff, a provider of automated identity verification technology, has secured $69 million in Series B financing, bringing the total amount raised by the company to $92.8 million. [Read More]
Microsoft's new 'CyberBattleSim' research toolkit supports the high-level abstract simulation of computer networks and cybersecurity concepts. [Read More]
The new 'Aviary' dashboard will help visualize and analyze output from Sparrow, a CISA-developed tool for detecting potentially malicious activity in Microsoft Azure and Microsoft 365 environments. [Read More]
Pwn2Own 2021 has come to an end, with participants earning more than $1.2 million for exploits in the browsers, virtualization, server, enterprise communications and privilege escalation categories. [Read More]
Threat actors are abusing organizations’ reliance on communication services such as Discord and Slack to circumvent network protections and ensure effectiveness of attacks. [Read More]
Cisco patches a critical vulnerability in an SD-WAN software product but warned that a different high-risk bug in end-of-life small business routers will remain unpatched. [Read More]
An unauthenticated update process vulnerability could be abused for the download and execution of malware on servers. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

William Lin's picture
Data security is a tough topic to summarize and I’d argue it may be the most misunderstood category in security right now.
AJ Nash's picture
Even if the best strategies and policies are created and uniformly agreed upon across all government and private sector domains, none of that will matter if the talent to execute does not exist.
Marc Solomon's picture
Collaboration with teams across the organization to utilize data more efficiently and effectively, dramatically improves detection and response and is critical to achieve enterprise-wide risk management.
Laurence Pitt's picture
Using Machine Learning (ML) with AI means that security tools can be trained to work better with data and the ML system will be able to make recommendations for improvements.
John Maddison's picture
In today’s highly dynamic environments, integration needs to go beyond just the security elements of a platform.
Gunter Ollmann's picture
Once live stomping around vendor-packed expo halls at security conferences returns, it is highly probable that “Virtual Analyst” will play a starring role in buzzword bingo.
Joshua Goldfarb's picture
Josh Goldfarb debunks the most common myths surrounding fraud, security and user experience.
John Maddison's picture
Security tools, regardless of where they have been deployed, need to be able leverage common security intelligence feeds and share alerts and threat data with other security tools.
Derek Manky's picture
If the history of cybersecurity has taught us anything, it’s that any time that we implement a new tool, a new capability, or a new functionality, security threats follow.
Gunter Ollmann's picture
Managed security services are undergoing a timely and significant transformation, armed with new hyperscalable technology stacks, hybrid enterprise and cross-cloud protection complexities.