Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Intel has unveiled Control-Flow Enforcement Technology (CET), a new security capability for processors that will protect systems against common malware attacks. [Read More]
Zoom says it will not offer end-to-end encryption to free users so that the FBI or local law enforcement can conduct investigations. [Read More]
An alert sent out this week by CISA reiterates previously issued recommendations on how organizations should properly secure Microsoft Office 365 deployments. [Read More]
Microsoft has launched a free zero trust assessment tool that helps organizations see where they are and provides recommendations for moving forward. [Read More]
Microsoft is testing its election-focused security solution ElectionGuard in Wisconsin at Supreme Court elections. [Read More]
Beginning March, when Firefox 74 is set to arrive in the release channel, Mozilla will disable older Transport Layer Security (TLS) protocol versions as default options for secure connections. [Read More]
Many devices are likely still vulnerable to DMA attacks, despite the fact that hardware and software vendors have taken steps to prevent such attacks. [Read More]
OpenSSL has evolved a great deal in terms of security since the disclosure of the Heartbleed vulnerability back in 2014. [Read More]
Google unveils OpenTitan, an open source silicon root of trust (RoT) project that can help ensure both hardware infrastructure and the software running on it remain in a trustworthy state. [Read More]
VMware unveils new security features and enhancements for its NSX, SD-WAN and Secure State products, along with a new zero trust architecture for digital workspaces. [Read More]

FEATURES, INSIGHTS // Security Architecture

rss icon

Jack Danahy's picture
Jack Danahy, co-founder and CTO of Barkly, attempts to clarify what is and what is not machine learning in endpoint security
Adam Meyer's picture
In the cyber threat intelligence space, there is confusion (much of which is driven by vendors)... where threat information is positioned as finished intelligence.
Scott Simkin's picture
Threat intelligence can play an important role in improving an organization’s overall cybersecurity posture, provided the right case is made and the right processes are put in place.
Avi Chesla's picture
In today’s market, more does not mean better. We need security innovation that makes more of what the industry already has by turning what we have into what we need.
Lance Cottrell's picture
By focusing on key attack surfaces and architecting systems to maximize the effectiveness of our monitoring efforts we can detect and stop intrusions much more quickly.
Rafal Los's picture
Security frameworks are designed to provide a reference for those designing various programmatic security mechanisms in order to benefit from collective successes and failures of the broad community.
Joshua Goldfarb's picture
Security has evolved to the point that I can now say that collection, sensing, and alerting are yesterday’s news.
Scott Simkin's picture
Threat intelligence is only valuable if an organization takes the necessary steps to quickly and easily apply that intelligence to actual security policy.
Johnnie Konstantas's picture
As NSA Chief Hacker Rob Joyce indicated during his recent talk at the Usenix Enigma conference, hackers are patient and persistent.
Joshua Goldfarb's picture
In security, we have grown accustomed to treating the symptoms of our problems, rather than treating the problems themselves.