Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Mastercard announces launch of new biometric card that combines chip technology with fingerprints [Read More]
LastPass patches vulnerabilities that could have allowed hackers to bypass two-factor authentication (2FA) [Read More]
Google hopes that by sharing its own experiences in developing and deploying tiered access, IT and security admins will feel empowered to develop a flexible and powerful access control system that better suits today's business. [Read More]
The ambient light sensors found in phones, tablets and laptops can be abused to steal sensitive browser data, researchers warn [Read More]
IOActive researchers found 10 vulnerabilities affecting more than 20 models of Linksys Smart Wi-Fi routers [Read More]
Cisco has released software updates to patch high severity DoS vulnerabilities in Firepower, ASA, IOS and UCM products [Read More]
Chrome, Firefox and Opera expose their users to phishing attacks that rely on Unicode domain names [Read More]
Recently disclosed remote code execution vulnerability related to Java implementations of AMF3 affects VMware vCenter Server via BlazeDS [Read More]
Company confirms cybercriminals used malware to steal payment card data from nearly 40 Shoney’s restaurants [Read More]
Vulnerabilities in Bosch’s Drivelog Connect dongle and its mobile app allow hackers to send malicious CAN messages to a car and stop its engine [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Travis Greene's picture
Having served aboard the USS Carl Vinson in the late 1990s, I can assure you that the World War II slogan, “loose lips sink ships” is still very much a part of Navy life.
Torsten George's picture
Unfortunately, a significant portion of information security resources are consumed by data gathering and aggregation processes.
Avi Chesla's picture
At the end of the day, CISOs are finding it very challenging to be able to assess the performance of the security products in their organization’s arsenal.
Erin O’Malley's picture
The CIA conducts extensive background investigations and requires polygraph examinations to gain a security clearance, yet a malicious insider apparently made off with a trove of secret CIA hacking tools.
Jennifer Blatnik's picture
While automation delivers many benefits to the enterprise, there are dangers to mindlessly automating every business function, especially when it comes to security.
Marie Hattar's picture
Full visibility is necessary when it comes to security, but some things should stay hidden. How do we see the whole network? What tools do we need? How do we stay compliant?
Scott Simkin's picture
Training employees to be aware of credential-based attacks and how to avoid them, as well as adopting the right prevention-based measures, can have a material impact on stopping a common and effective attack techniques.
Dan Cornell's picture
Security cannot exist in a vacuum – it must be integrated with the entirety of an organization’s strategy when it comes to securing development operations.
Ashley Arbuckle's picture
With more leading-edge IT capabilities available only in the cloud, companies that can migrate more of their applications accordingly stand to gain even greater agility, scalability, and efficiencies required for business success.
David Holmes's picture
Classic SSL interceptors are notoriously lackadaisical about certificate verification, but that doesn’t mean the only choice is not to use them or that they’re not needed.