Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Amazon launches Macie, a new service that helps AWS users discover, classify and protect sensitive data [Read More]
Hackers possibly from China planted a backdoor in popular connectivity tools from NetSarang as part of a major supply chain attack [Read More]
Public cloud environments are the most secure, according to data collected over an 18-month period by Alert Logic [Read More]
Webroot buys security awareness training company Securecast to offer a security awareness platform to MSPs [Read More]
A password recovery firm has claimed that the overall security of password managers is debatable, and not necessarily more secure than keeping a list of passwords in a single Excel spreadsheet. [Read More]
VMware patches hard-to-exploit DoS vulnerability in the NSX-V network virtualization solution [Read More]
Three vulnerabilities, including two password issues, patched in the PostgreSQL open source database management system [Read More]
Russia-linked cyberspy group APT28 targets hotels in Europe and their main target may be government and business travelers [Read More]
Under the principle of set a thief to catch a thief, 250 hackers at Black Hat 2017 were asked about their hacking methods and practices. This is what they said... [Read More]
Version control systems Git, Subversion, Mercurial and CVS affected by command execution vulnerability [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Erin O’Malley's picture
Can you see into all data across your network? Or does some data remain hidden due to silos between network and security operations teams?
Steven Grossman's picture
Organizations are increasingly combining UEBA technology with other data sources and analytics methods to overcome cyber risk challenges on a broader scale.
David Holmes's picture
Security researchers found 26 vulnerabilities within ISP network devices that would have given them remote admin access to the majority of home networks in the United States.
Alan Cohen's picture
From a security perspective, to create understand application dependencies you need not only to understand the flows and servers, you need to understand the ports and underlying processes.
Oliver Rochford's picture
Security automation is highly desirable. But this desire has been inhibited by doubt about the accuracy of the detection of threats, and fear of the consequences of automating the containment or mitigation responses.
Marc Solomon's picture
Scaling your operations allows you to get more from these investments and demonstrate even greater value to the organization – and you already have what you need to get going.
Ashley Arbuckle's picture
Many organizations are not achieving the full benefits of digital transformation because they lack a comprehensive security program.
Jennifer Blatnik's picture
Whether they come from a technical, business or even military background, all CISOs experience a number of personal and professional roadblocks on a daily basis that challenge the ultimate success of their company’s security.
Marc Solomon's picture
For many organizations, threat intelligence is at an inflection point; it can either add to the complexity security teams struggle with on a daily basis, or it can provide clarity and enable a more secure future.
Steven Grossman's picture
Planning for cyber protection and resiliency is a large topic that requires the right framework and a balance of strategic and tactical thinking.