Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

CISA has added former DNC and Yahoo CISO Bob Lord to its stable of technical advisors. [Read More]
South American startup Strike Security has secured $5.4 million to fund an ambitious plan to disrupt the penetration testing and attack surface management business. [Read More]
Despite an increase in attacks, ICS/OT companies admit that they turn off cybersecurity systems if they cause problems to operations. [Read More]
Microsoft drops a massive Patch Tuesday bundle and warns of an in-the-wild zero-day attack hitting Windows users. [Read More]
OpenSSH 9.0 has been fitted with new defaults to prevent "capture now, decrypt later" attacks linked to advancements in quantum computing. [Read More]
Honeywell, Claroty, Nozomi and Forescout have teamed up to create the Operational Technology Cybersecurity Coalition. [Read More]
The researchers targeted a two-GPU architecture and were able to accurately fingerprint the application running on the remote GPU. [Read More]
PCI Data Security Standard (DSS) v4.0 released to address emerging threats to customer payment information. [Read More]
Threat hunters at Checkmarx raise an alarm after discovering a threat actor fully automating the creation and delivery of "hundreds of malicious packages" into the NPM ecosystem. [Read More]
The Ukraine computer emergency response team reports malicious cyber activity from Chinese threat actors following the Russian invasion. [Read More]

FEATURES, INSIGHTS // Security Architecture

rss icon

Laurence Pitt's picture
SASE is gaining momentum and can ensure that users receive the correct, risk-based level of access to systems at any moment in time.
Gordon Lawson's picture
While employees want to do the right thing when it comes to protecting their organization from cyber threats, we cannot expect them to be perfect.
Marc Solomon's picture
When automation is consciously balanced between humans and machines, we can ensure security teams always have the best tool for the job.
John Maddison's picture
Cybersecurity deployments have become as complex as the networks they are trying to protect. And that’s not a good thing.
Marc Solomon's picture
An open integration architecture provides the greatest access to data from technologies, threat feeds and other third-party sources, and the ability to drive action back to those technologies once a decision is made.
Torsten George's picture
Cyber resiliency measures (i.e., architectural design, technologies, operational practices) assume that today’s threat actors can achieve a foothold in an organization’s infrastructure and in turn post-exploit activities must be contained and eliminated.
Marc Solomon's picture
As you determine what security technologies to invest in, develop not only a technology roadmap, but also include and align an operational roadmap.
Marc Solomon's picture
Most organizations have a complex security infrastructure that consists of multiple products from multiple vendors to create layers of defense.
Laurence Pitt's picture
Cybersecurity innovation is not quite at the stage where it needs resuscitation, still, the last few months have demonstrated the need for change.
Torsten George's picture
Today’s economic climate exacerbates risks of insider threats, as pending furloughs or pay cuts may tempt employees to exfiltrate data to secure a new job, make up for income losses, etc.