Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Researchers discovered several serious vulnerabilities in the WD TV Media Player. No patches available [Read More]
Cisco patches critical and high severity vulnerabilities in its Prime Collaboration Provisioning software [Read More]
The latest Joomla update patches a critical SQL injection vulnerability that can be easily exploited by remote attackers [Read More]
More than 200 Brooks Brothers stores hit by payment card breach. Hackers had access to payment processing systems for nearly a year [Read More]
Corvil's "Virtual Security Expert" is a new tool that acts as a virtual security expert that autonomously identifies vulnerabilities and possible attacks within the trading environments. [Read More]
People are the new perimeter as hackers are targeting users as their doorway into the enterprise. According to a recent survey, identity governance is recognized by 97% of respondents as a key solution to this problem. [Read More]
Hackers breached DocuSign systems and stole email addresses, which they used in a spam campaign designed to deliver malware [Read More]
In the light of a recent phishing attack targeting Gmail users, Google is updating its app identity guidelines and is implementing a more thorough review process for new web applications that request user data. [Read More]
HP has removed the keylogger functionality found by researchers in audio drivers provided for 28 laptops and tablet PCs [Read More]
Industry experts comment on the implications of U.S. President Donald Trump’s executive order on cybersecurity [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Marie Hattar's picture
Full visibility is necessary when it comes to security, but some things should stay hidden. How do we see the whole network? What tools do we need? How do we stay compliant?
Scott Simkin's picture
Training employees to be aware of credential-based attacks and how to avoid them, as well as adopting the right prevention-based measures, can have a material impact on stopping a common and effective attack techniques.
Dan Cornell's picture
Security cannot exist in a vacuum – it must be integrated with the entirety of an organization’s strategy when it comes to securing development operations.
Ashley Arbuckle's picture
With more leading-edge IT capabilities available only in the cloud, companies that can migrate more of their applications accordingly stand to gain even greater agility, scalability, and efficiencies required for business success.
David Holmes's picture
Classic SSL interceptors are notoriously lackadaisical about certificate verification, but that doesn’t mean the only choice is not to use them or that they’re not needed.
Joshua Goldfarb's picture
Although attackers still use malicious code quite often, they have been relying less and less on it. So how do attackers manage to be so successful without using any malware at all?
Marc Solomon's picture
Companies can make their entire security infrastructure more effective by using this threat intelligence as the glue to integrate layers of point products within a defense-in-depth strategy.
Ken McAlpine's picture
To apply an effective intent-based network security strategy to networks, security teams need to rethink how they plan, design, organize, and implement network architecture.
Josh Lefkowitz's picture
Without automation, analysts spend more time digging and less time interpreting information as only humans can do, to produce true intelligence.
David Holmes's picture
Ladies and Gentlemen! Gamers and Cryptoheads! Have you ever wondered which major gaming console has the best message encryption? Well, I’m going to reveal the clear winner in my own recent personal test.