Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Equifax’s cybersecurity failings, including ignored vulnerability reports and executive credentials up for sale on the dark web, revealed following the breach [Read More]
Trend Micro patches several vulnerabilities, including ones rated critical and high severity, in Mobile Security for Enterprise [Read More]
Equifax shares more details about the breach and how it was discovered by the company [Read More]
VMware patches critical SVGA code execution flaw and other vulnerabilities in ESXi, vCenter Server, Workstation and Fusion [Read More]
Google has decided that starting with Chrome 63 resources delivered over FTP will be labeled “not secure” [Read More]
While the data stolen in the Equifax hack might be up for sale, scammers have also set up websites offering the data [Read More]
President Donald Trump on blocked attempts by a Chinese state-owned firm to acquire Lattice Semiconductor Corporation over national security concerns, drawing a rebuke from Beijing. [Read More]
Mocana this week announced that it has verified the integration of its IoT Security Platform with the IoT cloud platforms of Amazon Web Services, Microsoft Azure IoT, and VMware. [Read More]
CEO Eugene Kaspersky will testify before Congress regarding the use of Kaspersky products by the U.S. government [Read More]
Around 200,000 WordPress websites were impacted after a plugin they were using was updated to include malicious code. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Josh Lefkowitz's picture
Oil and gas is one of the critical infrastructure sectors that face greater risks and challenges when it comes to security
Adam Meyer's picture
When thinking about threat intelligence, before you buy a data feed, platform, service, etc. you should have a defined process in place that supports a defined strategy.
Erin O’Malley's picture
Can you see into all data across your network? Or does some data remain hidden due to silos between network and security operations teams?
Steven Grossman's picture
Organizations are increasingly combining UEBA technology with other data sources and analytics methods to overcome cyber risk challenges on a broader scale.
David Holmes's picture
Security researchers found 26 vulnerabilities within ISP network devices that would have given them remote admin access to the majority of home networks in the United States.
Alan Cohen's picture
From a security perspective, to create understand application dependencies you need not only to understand the flows and servers, you need to understand the ports and underlying processes.
Oliver Rochford's picture
Security automation is highly desirable. But this desire has been inhibited by doubt about the accuracy of the detection of threats, and fear of the consequences of automating the containment or mitigation responses.
Marc Solomon's picture
Scaling your operations allows you to get more from these investments and demonstrate even greater value to the organization – and you already have what you need to get going.
Ashley Arbuckle's picture
Many organizations are not achieving the full benefits of digital transformation because they lack a comprehensive security program.
Jennifer Blatnik's picture
Whether they come from a technical, business or even military background, all CISOs experience a number of personal and professional roadblocks on a daily basis that challenge the ultimate success of their company’s security.