Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Amazon-owned Whole Foods Market said the recent payment card breach impacted nearly 100 locations across the U.S. [Read More]
Visa launches ID Intelligence, a new platform that allows card issuers, acquirers and merchants to adopt new biometric methods of their own preference [Read More]
Google prompt has now become the primary choice for 2-Step Verification (2SV), instead of SMS [Read More]
A new, massive Mirai-linked botnet is recruiting improperly secured IoT devices such as IP wireless cameras [Read More]
Google is offering a bonus of $1,000 to researchers who find serious vulnerabilities in select Android apps present on Google Play [Read More]
BoundHook hooking method is invisible to Windows 10’s PatchGuard. The issue is not considered a vulnerability by Microsoft [Read More]
New Magniber (Magnitude+Cerber) ransowmare delivered to users in South Korea via Magnitude exploit kit [Read More]
DHS orders all federal agencies to implement DMARC, but Agari says currently only 9% have fully implemented the system [Read More]
Security firm discloses several unpatched vulnerabilities affecting Linksys E-series wireless routers [Read More]
Cisco patches critical vulnerability in Cloud Services Platform. Flaws also addressed in small business IP phones and other products [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Scott Simkin's picture
There are fundamentals that have stood the test of time and can help prevent successful cyber breaches from occurring despite the pace at which the landscape shifts.
Jennifer Blatnik's picture
By taking what you know about security in the physical world and logically applying it to the virtual world, you can effectively protect your personal information.
Justin Fier's picture
When third-parties are integrated onto the network, threats are bound to slip through the cracks, and the Equifax hack demonstrated how easy it is for a subtle threat to develop into a debilitating data breach.
Marie Hattar's picture
Moving applications and content out to the edge of the network in cellular base stations is making some CSOs at large enterprises nervous.
Ashley Arbuckle's picture
If you’re among the majority taking an architectural approach to consolidate security vendors then remember, your best defense is a good offense.
Marc Solomon's picture
How do you determine the amount and mix of data that’s “just right” for your organization? To answer this question it helps to understand what’s driving the need for data in the first place.
Jennifer Blatnik's picture
You can slow down a hacker, but it will do you good to accept that you may never be able to truly stop someone from getting through your first line of defense.
Adam Meyer's picture
With sound cyber threat intelligence informing these plays in your book, you have practical methodologies to both proactively mitigate and more quickly and effectively respond to specific threats.
Alastair Paterson's picture
What can U.S.-based companies do to prepare for the GDPR that is due to come into force in May 2018? These five steps can help.
Oliver Rochford's picture
To succeed in an era of rapidly evolving threats and emerging technology and the resulting shortfall of actionable evidence and lack of certainty, hypothesizing is the closest we can get to prediction.