Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

High severity vulnerabilities in Cisco IOS allow attackers to cause a DoS condition by sending specially crafted packets [Read More]
Google painted a bleak picture of cybersecurity trends, saying the number of websites hacked rose 32 percent in 2016, with little relief in sight. [Read More]
A recently disclosed User Account Control (UAC) bypass that leverages App Paths can be used for fileless attacks as well, security researcher Matt Nelson now says. [Read More]
A vulnerable application used by millions of McDonald’s customers in India was recently found to leak personal information of its users. [Read More]
Researchers find serious vulnerabilities in Moodle, a popular learning platform used by many top universities [Read More]
Built on the Linux Foundation's open source Hyperledger Fabric v1.0 and the IBM Blockchain service, a new digital identity and attribute sharing network from IBM and SecureKey will go live in Canada later in 2017. [Read More]
A researcher has demonstrated an attack that combines Clickjacking and a type of Cross Site Scripting (XSS) called Self-XSS. [Read More]
Hundreds of Cisco switches are affected by a critical zero-day vulnerability found by the vendor during its analysis of WikiLeaks’ Vault 7 files [Read More]
A newly technique that leverages App Paths to bypass the User Account Control (UAC) in Windows 10 has been detailed by security researcher Matt Nelson. [Read More]
The US Department of Homeland Security's US-CERT has issued a new alert warning about problems with some HTTPS inspection products. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Joshua Goldfarb's picture
Although attackers still use malicious code quite often, they have been relying less and less on it. So how do attackers manage to be so successful without using any malware at all?
Marc Solomon's picture
Companies can make their entire security infrastructure more effective by using this threat intelligence as the glue to integrate layers of point products within a defense-in-depth strategy.
Ken McAlpine's picture
To apply an effective intent-based network security strategy to networks, security teams need to rethink how they plan, design, organize, and implement network architecture.
Josh Lefkowitz's picture
Without automation, analysts spend more time digging and less time interpreting information as only humans can do, to produce true intelligence.
David Holmes's picture
Ladies and Gentlemen! Gamers and Cryptoheads! Have you ever wondered which major gaming console has the best message encryption? Well, I’m going to reveal the clear winner in my own recent personal test.
Ashley Arbuckle's picture
Generally referred to as the “attack chain,” the approach cybercriminals follow to launch and execute attacks is well-documented and includes reconnaissance, weaponization, delivery, and installation.
Travis Greene's picture
Shadow IT 2.0 is a symptom of a bigger problem – the inability to maintain digital competitive advantage due to the insufficient pace of code deployment.
Scott Simkin's picture
Attackers have developed anti-VM analysis techniques to allow the malware to recognize when it is being run on a virtual machine and fail to execute, meaning the system or threat analytics cannot make a verdict determination or extract intelligence from the sample.
Adam Meyer's picture
Cyber threat intelligence needs to be tailored to its audience as it means different things to different people, whether it’s on-the-network defenders, Red Teams, threat analysts, risk officers, business executives and Board of Directors, legal, application owners, and so on.
Jennifer Blatnik's picture
Focusing on securing an endless amount of endpoints is almost impossible to do effectively. You can’t rely on the devices to be secure and you can’t rely on the consumers to secure their devices themselves.