Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Vera's new Multi-Factor Authentication offering adds strong authentication to corporate data wherever it travels, and allows MFA to be limited to specified data. [Read More]
Several flaws, including ones rated critical, found in Rockwell Automation’s Allen-Bradley MicroLogix PLCs. Patches available only for some devices [Read More]
Trend Micro patches half a dozen vulnerabilities in its ServerProtect for Linux product [Read More]
Google researcher Tavis Ormandy releases tool for porting Windows DLLs to Linux to improve fuzzing - ports Windows Defender as demo [Read More]
A new behavioral authentication product announced by security firm Preempt allows optional multi-factor authentication (MFA), based on user behavior, on any application. [Read More]
Attackers can remotely hijack millions of systems using malicious subtitle files and vulnerabilities in popular media players [Read More]
The number of phishing websites using HTTPS increased considerably since Firefox and Chrome introduced warnings for unsafe login pages [Read More]
Medical devices also infected with WannaCry ransomware. Several manufacturers release security advisories [Read More]
The fight against cyberattacks has sparked exponential growth in global protection spending, with the cyber security market estimated at $120 billion this year, more than 30 times its size just over a decade ago. [Read More]
Researcher earns $5,000 for information disclosure vulnerability found in Google’s intranet login page [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Preston Hogue's picture
Defenders need a new type of counterinsurgent security that can move out into the jungle to protect users and sensitive data against attackers who disguise their exploits with the very encryption that we think keeps us safe.
Marie Hattar's picture
Understanding how well (or not) websites and networks deal with the unexpected spikes in inbound traffic is the first step in dealing with DDoS attacks.
Adam Meyer's picture
Different intelligence consumers in your organization create and consume varying levels of threat intel to take appropriate actions against identified risks.
Justin Fier's picture
Some of the most sophisticated cyber-attacks have started with an IoT breach. Not only are such attacks subtle, silent, and stealthy, but typically they are carried out with military precision.
Ashley Arbuckle's picture
Just like getting off the couch and into shape can be overwhelming, the same can be true for transitioning to the public cloud.
Travis Greene's picture
Having served aboard the USS Carl Vinson in the late 1990s, I can assure you that the World War II slogan, “loose lips sink ships” is still very much a part of Navy life.
Torsten George's picture
Unfortunately, a significant portion of information security resources are consumed by data gathering and aggregation processes.
Avi Chesla's picture
At the end of the day, CISOs are finding it very challenging to be able to assess the performance of the security products in their organization’s arsenal.
Erin O’Malley's picture
The CIA conducts extensive background investigations and requires polygraph examinations to gain a security clearance, yet a malicious insider apparently made off with a trove of secret CIA hacking tools.
Jennifer Blatnik's picture
While automation delivers many benefits to the enterprise, there are dangers to mindlessly automating every business function, especially when it comes to security.