Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Chinese drone maker DJI and a researcher are in an online battle – which could also turn into a legal battle – over the company’s bug bounty program [Read More]
Apache CouchDB was affected by critical vulnerabilities that could have allowed remote attackers to escalate privileges and execute code [Read More]
A critical vulnerability in Cisco’s Voice Operating System exposes a dozen collaboration products to remote attacks [Read More]
Vulnerabilities in the popular WordPress plugin Formidable Forms expose sensitive data and allow hackers to hijack websites [Read More]
Oracle patches several vulnerabilities, including two rated critical, in the Jolt server component of the company’s Tuxedo product [Read More]
Forever 21 investigating payment card breach, but only few details were provided by the company [Read More]
Microsoft uses deep neural networks to improve fuzzing techniques. Tests conducted via AFL fuzzer [Read More]
Threat intelligence platform provider ThreatQuotient has raised $30 million in Series C funding, bringing the total amount raised by the company to $54 million to date. [Read More]
Face ID, the facial biometric unlocking technology included in Apple’s recently laucnhed iPhone X, can be bypassed using a mask, security researchers have discovered. [Read More]
VMware patches moderate severity DoS and information disclosure vulnerabilities in vCenter Server [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Lance Cottrell's picture
Passive Information Leakage (PIL) is one of the least known and most difficult forms of data lost to prevent, and is little understood, primarily because it cannot be addressed through conventional security practices.
Joshua Goldfarb's picture
Security teams have given up on building their workflow around a small number of “silver bullets” that claim to solve most of their problems
Dan Cornell's picture
As you start to get an idea of what your application portfolio looks like, you then need to start determining the specific risks that applications can expose your organization to.
Josh Lefkowitz's picture
It’s crucial to recognize that 2018 will very likely be yet another year of increasingly complex and damaging threats and incidents, which is why we must always build upon and further enhance our intelligence strategies.
Steven Grossman's picture
The challenge of data protection is not going away. Even without the ever-improving tactics of the bad guys, data sprawl has made it difficult for those just trying to do their jobs.
Oliver Rochford's picture
Compared to the perception that security inhibits productivity and innovation, the reality is bad security has a far greater negative impact.
John Maddison's picture
Here are six things every organization needs to consider when approaching security, especially during the chaos and time pressures of a network undergoing digital transformation.
David Holmes's picture
DUHK and ROCA are both implementation-specific vulnerabilities concerning one of my favorite topics, random number generators.
Scott Simkin's picture
There are fundamentals that have stood the test of time and can help prevent successful cyber breaches from occurring despite the pace at which the landscape shifts.
Jennifer Blatnik's picture
By taking what you know about security in the physical world and logically applying it to the virtual world, you can effectively protect your personal information.