Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Oracle improves its cloud security offering, including machine learning, artificial intelligence and contextual awareness technologies [Read More]
RedLock emerges from stealth with cloud infrastructure security offering and $12 million in funding [Read More]
President Trump's cybersecurity executive order appears to build on the cybersecurity efforts already achieved by the previous administration and will promote an invaluable bi-partisan approach to the future of federal and critical infrastructure security. [Read More]
Mozilla has been following the certificate-related debate between Symantec and Google, and it largely agrees with the latter [Read More]
DARPA is seeking proposals for hardware architectures that will disarm many of today’s software attacks [Read More]
White hat hackers earned tens of thousands of dollars for finding critical vulnerabilities in GitHub Enterprise [Read More]
Israel-based cybersecurity startup Cymulate announced on Friday that it has raised $3 million through a Series A round of financing led by Susquehanna Growth Equity. [Read More]
ThreatConnect launches new suite of threat intelligence products that help companies understand adversaries and automate security operations [Read More]
New study shows that companies in the US, UK and Germany are increasingly interested in taking out cyber insurance [Read More]
Absolute extends endpoint security self-healing capabilities to third-party applications [Read More]

FEATURES, INSIGHTS // Security Architecture

rss icon

Adam Meyer's picture
In the cyber threat intelligence space, there is confusion (much of which is driven by vendors)... where threat information is positioned as finished intelligence.
Scott Simkin's picture
Threat intelligence can play an important role in improving an organization’s overall cybersecurity posture, provided the right case is made and the right processes are put in place.
Avi Chesla's picture
In today’s market, more does not mean better. We need security innovation that makes more of what the industry already has by turning what we have into what we need.
Lance Cottrell's picture
By focusing on key attack surfaces and architecting systems to maximize the effectiveness of our monitoring efforts we can detect and stop intrusions much more quickly.
Rafal Los's picture
Security frameworks are designed to provide a reference for those designing various programmatic security mechanisms in order to benefit from collective successes and failures of the broad community.
Joshua Goldfarb's picture
Security has evolved to the point that I can now say that collection, sensing, and alerting are yesterday’s news.
Scott Simkin's picture
Threat intelligence is only valuable if an organization takes the necessary steps to quickly and easily apply that intelligence to actual security policy.
Johnnie Konstantas's picture
As NSA Chief Hacker Rob Joyce indicated during his recent talk at the Usenix Enigma conference, hackers are patient and persistent.
Joshua Goldfarb's picture
In security, we have grown accustomed to treating the symptoms of our problems, rather than treating the problems themselves.
Wade Williamson's picture
Data science and machine learning models can assess large groups of cyber threats to find the subtle traits they have in common to better protect organizations.