Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

PayPal suspends operations of its subsidiary TIO Networks after the discovery of a data breach that affects 1.6 million customers [Read More]
System76 plans on disabling Intel’s Management Engine (ME) on its laptops following the discovery of several vulnerabilities [Read More]
ERPScan announces new AI-driven security platform designed to help organizations prevent, detect and respond to attacks targeting SAP systems [Read More]
DigiCert addresses the concerns raised by Mozilla and others regarding its acquisition of Symantec’s certificate business [Read More]
Security analytics firm Skybox raises $150 million to advance its cybersecurity management product [Read More]
Symantec announces new capabilities in Symantec Endpoint Protection (SEP) and claims it’s leapfrogging the competition [Read More]
Organizations are increasingly turning to machine learning for security solutions, according to a new study commissioned by Cylance [Read More]
Endgame used Mitre’s ATT&CK Matrix to evaluate its endpoint detection and response product by emulating an APT3 attack [Read More]
Google says roughly two-thirds of the websites loaded through Chrome use HTTPS by default [Read More]
U.S. Federal Energy Regulatory Commission (FERC) proposes new cyber security management controls to enhance power grid reliability and resilience [Read More]

FEATURES, INSIGHTS // Security Architecture

rss icon

Wade Williamson's picture
Data science and machine learning models can assess large groups of cyber threats to find the subtle traits they have in common to better protect organizations.
Tim Layton's picture
While we must continue to use defensive technologies because they help address the level of white noise that has become part of the cost to operate in our hyper-connected, digitized world, we can’t stop there.
Joshua Goldfarb's picture
There are many contextual details that differentiate cyber threat information from threat intelligence. Only with the proper context can data be considered intelligence, rather than simply information.
Joshua Goldfarb's picture
Taking a look at security from a different vantage point that allows us to correlate activity by user, rather than by system alone gives us a very different perspective.
Scott Simkin's picture
When vendors and individuals attempt to keep threat intelligence private, they limit the ability of the entire group to identify and mitigate new threats as they are developed and launched against organizations.
Joshua Goldfarb's picture
Rather than proceed step by step through the process of building and maturing a security operations function, security teams often want to move immediately into very advanced topics.
Alan Cohen's picture
Today’s network perimeter is increasingly not a single physical or virtual place, yet much of the industry debate is still focused on the perimeter.
Jason Polancich's picture
Without a solid base in knowing who you are as a target and what’s going on around you at all times, everything else you do is essentially a half-measure.
Rafal Los's picture
Security leaders struggle to replicate successes from one enterprise to another largely because they are starting from scratch at every new turn.
Joshua Goldfarb's picture
The question of build or buy is not a new one, but it is one that does not adequately suit the implementation of a security solution.