Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Apple has acquired Fleetsmith, a company that specializes in solutions that automate the setup, patching and security of Macs, iPhones, iPads and Apple TV devices. [Read More]
Microsoft has extended the protection capabilities of Microsoft Defender Advanced Threat Protection (ATP) with the addition of a UEFI scanner. [Read More]
Intel has unveiled Control-Flow Enforcement Technology (CET), a new security capability for processors that will protect systems against common malware attacks. [Read More]
Zoom says it will not offer end-to-end encryption to free users so that the FBI or local law enforcement can conduct investigations. [Read More]
An alert sent out this week by CISA reiterates previously issued recommendations on how organizations should properly secure Microsoft Office 365 deployments. [Read More]
Microsoft has launched a free zero trust assessment tool that helps organizations see where they are and provides recommendations for moving forward. [Read More]
Microsoft is testing its election-focused security solution ElectionGuard in Wisconsin at Supreme Court elections. [Read More]
Beginning March, when Firefox 74 is set to arrive in the release channel, Mozilla will disable older Transport Layer Security (TLS) protocol versions as default options for secure connections. [Read More]
Many devices are likely still vulnerable to DMA attacks, despite the fact that hardware and software vendors have taken steps to prevent such attacks. [Read More]
OpenSSL has evolved a great deal in terms of security since the disclosure of the Heartbleed vulnerability back in 2014. [Read More]

FEATURES, INSIGHTS // Security Architecture

rss icon

Marc Solomon's picture
Most organizations have a complex security infrastructure that consists of multiple products from multiple vendors to create layers of defense.
Laurence Pitt's picture
Cybersecurity innovation is not quite at the stage where it needs resuscitation, still, the last few months have demonstrated the need for change.
Torsten George's picture
Today’s economic climate exacerbates risks of insider threats, as pending furloughs or pay cuts may tempt employees to exfiltrate data to secure a new job, make up for income losses, etc.
Preston Hogue's picture
The healthcare industry will need advanced security measures to identify and mitigate flaws in new apps carrying the world’s most sensitive, regulated information.
Marie Hattar's picture
Organizations should regularly put security products, processes and people to the test, and the reward is better, more efficient protection against attacks.
Josh Lefkowitz's picture
Choosing which vendor to partner with can be exceptionally difficult for MSSPs due to the oversaturation and complexity of the threat intelligence market.
Torsten George's picture
Shifting traditional perimeter-based enterprise security strategies to a Zero Trust approach provides more robust prevention, detection, and incident response capabilities to protect continuously expanding attack surfaces.
Grady Summers's picture
There are many pitfalls, and some simple rules that can help you make smarter decisions if you are in looking to purchase security products seen at RSA Conference.
Josh Lefkowitz's picture
Evaluating a threat intelligence vendor’s collection strategy effectively is a complex process that requires far more than simply obtaining the answers to the questions outlined above.
Ashley Arbuckle's picture
As a security professional, it’s time to take a fresh look at what your organization can do to compensate for insider negligence.