Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Google is taking another step to better protect users from malicious third-party web applications by warning users of newly created web apps and Apps Scripts that are pending verification. [Read More]
A security audit of Firefox Accounts revealed a total of 15 issues, including flaws rated critical and high severity [Read More]
A vulnerability dubbed by researchers Devil’s Ivy could affect millions of security cameras and other IoT devices [Read More]
Dow Jones has exposed the details of millions of customers via a misconfigured AWS S3 bucket [Read More]
Cisco patches critical WebEx remote code execution vulnerabilities found by Google and Divergent Security researchers [Read More]
Google this week will start inviting 2-Step Verification (2-SV) SMS users to try Google Prompt, its year-old method of approving sign-in requests on smartphones. [Read More]
IBM has announced its latest version of its mainframe, the IBM Z14, which it calls "the most significant re-positioning of mainframe technology in more than a decade." [Read More]
Owner of cheating service Ashley Madison offers to pay $11.2 million to settle data breach lawsuits [Read More]
Over 750 domains hijacked and pointed to RIG exploit kit after attackers accessed a web portal belonging to a technical partner of French registrar Gandi [Read More]
An attack called "WPSetup" is targeting fresh WordPress installations to get admin access and execute PHP code in the victim’s web hosting account. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Alan Cohen's picture
Since VMware introduced the concept of micro-segmentation for data center security, the security and networking industry have been racing to introduce competing technologies to reduce the lateral spread of bad actors in the data center and cloud.
Alastair Paterson's picture
By using best practices to protect credentials, while at the same time monitoring for leaked credentials and changes in the tools attackers use, you can mitigate the risk of account takeovers to your organization.
Preston Hogue's picture
Today an organization may have thousands of apps on the internet, but having thousands of monolithic security devices just isn’t practical.
Scott Simkin's picture
Traditional methods of creating, delivering and operationalizing security innovations have grown ever more complex due to a combination of several market factors.
Eddie Garcia's picture
Apache Spot is in its early stages yet it already has all the potential to be the platform where the good guys collaborate, sharing models and algorithms to find the bad actors.
Ken McAlpine's picture
Once you’ve decided that you need to include some SD-WAN capabilities to your network, you should also look at the implications to your security practices.
Ashley Arbuckle's picture
When it comes to automation, most defenders are operating at a deficit. So what’s holding so many enterprises back from incorporating automation in their security programs?
Ting-Fang Yen's picture
With the commoditization of cloud computing in recent years, fraudsters and cybercriminals alike have started to take advantage of public cloud services and dedicated/virtual hosting to conduct attacks.
Oliver Rochford's picture
Einstein is often quoted as having said that insanity is doing the same thing again and again and expecting a different result. When it comes to cybersecurity, based on that definition, we must all be insane.
Preston Hogue's picture
Defenders need a new type of counterinsurgent security that can move out into the jungle to protect users and sensitive data against attackers who disguise their exploits with the very encryption that we think keeps us safe.