Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Following an increase in Android malware and adware abusing accessibility services, Google decides to crack down on apps that misuse the feature [Read More]
Account takeover study conducted by Google shows that phishing poses the greatest threat to users, followed by keyloggers and third-party breaches [Read More]
CIA source code files published by WikiLeaks as part of the Vault 8 leak appear to show that the intelligence agency impersonated Kaspersky Lab [Read More]
Started by a former senior scientist for FireEye, cybersecurity firm SlashNext uses cognitive computing to detect advanced cyberattacks in the same way that humans do. [Read More]
Microsoft releases security advisory on how users can protect themselves against attacks leveraging DDE [Read More]
Intrusion detection system (IDS) signatures can be used as an evasion technique to bypass the IDS itself, thus serving as an attacker’s tools, a security researcher claims. [Read More]
Hundreds of apps that use Twilio SDK or REST API include hardcoded credentials that can be used to access millions of calls and text messages [Read More]
DevOps is increasing the attack surface in at least one area -- privileged accounts. [Read More]
Amazon adds five new encryption and security features to its S3 service, including one that alerts users of publicly accessible buckets [Read More]
The recently disclosed crypto flaw affecting Infineon chips takes less time to exploit than initially believed [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Justin Fier's picture
When third-parties are integrated onto the network, threats are bound to slip through the cracks, and the Equifax hack demonstrated how easy it is for a subtle threat to develop into a debilitating data breach.
Marie Hattar's picture
Moving applications and content out to the edge of the network in cellular base stations is making some CSOs at large enterprises nervous.
Ashley Arbuckle's picture
If you’re among the majority taking an architectural approach to consolidate security vendors then remember, your best defense is a good offense.
Marc Solomon's picture
How do you determine the amount and mix of data that’s “just right” for your organization? To answer this question it helps to understand what’s driving the need for data in the first place.
Jennifer Blatnik's picture
You can slow down a hacker, but it will do you good to accept that you may never be able to truly stop someone from getting through your first line of defense.
Adam Meyer's picture
With sound cyber threat intelligence informing these plays in your book, you have practical methodologies to both proactively mitigate and more quickly and effectively respond to specific threats.
Alastair Paterson's picture
What can U.S.-based companies do to prepare for the GDPR that is due to come into force in May 2018? These five steps can help.
Oliver Rochford's picture
To succeed in an era of rapidly evolving threats and emerging technology and the resulting shortfall of actionable evidence and lack of certainty, hypothesizing is the closest we can get to prediction.
Siggi Stefnisson's picture
SSL encryption can create blind spots in many organizations, as malware in the HTTPS channel is essentially hidden from most web security tools.
Marc Solomon's picture
With the sheer volume of threat data continuing to climb at a staggering rate, security teams need to start with the threat – automating how we gather, score and prioritize threat intelligence.