Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Container security company Aqua Security has raised another $30 million, which brings the total raised by the firm to date to more than $130 million. [Read More]
Verizon's Data Breach Investigations Report (DBIR) remains a fundamental asset for the discovery of existing and evolving threats, allowing practitioners to see where they should focus effort for an effective risk-based security posture. [Read More]
Facebook founder Mark Zuckerberg on Monday urged the European Union to take the lead in setting global standards for tech regulation or risk seeing countries follow China as a model. [Read More]
Huawei is at the center of the U.S.-Chinese conflict over Beijing’s technology ambitions, which Washington worries might erode American industrial leadership. [Read More]
US officials moved to cut off Chinese tech giant Huawei from global chipmakers, ramping up sanctions on the company seen by Washington as a national security risk. [Read More]
A coalition of consumer groups filed a complaint Thursday with US regulators claiming the popular video app TikTok has failed to live up to an agreement last year limiting data collection from children. [Read More]
Identity protection provider Venafi is acquiring Jetstack, a company specializing in open source machine identity protection software for Kubernetes. [Read More]
Palo Alto Networks has patched over two dozen vulnerabilities in PAN-OS, including many that have a critical or high severity rating and a few that can be exploited without authentication. [Read More]
VMware has announced the acquisition of Kubernetes security company Octarine and the launch of a new SOC alliance. [Read More]
Code quality and security solutions provider SonarSource has acquired code security testing company RIPS Technologies. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Laurence Pitt's picture
Every business is likely to be subject to cyberattacks at some point, and the option is to either take on the cost of putting measures in place before it happens or paying to clean up after.
Torsten George's picture
Today’s economic climate exacerbates risks of insider threats, as pending furloughs or pay cuts may tempt employees to exfiltrate data to secure a new job, make up for income losses, etc.
Gunter Ollmann's picture
CISOs are increasingly partnering with DevOps leaders and vigilantly modernizing secure development lifecycle (SDLC) processes to embrace new machine learning (ML) approaches.
John Maddison's picture
The rate at which recent networking changes have had to occur, and the speed at which cybercriminals have been able to respond, teach us clearly what is needed going forward to ensure ongoing proactive cyber protection.
Laurence Pitt's picture
For an MSP looking to grow business, the convergence of SD-WAN and security, along with the transitional needs of customers, translates to opportunity.
Torsten George's picture
With IT budgets being cut back in response to the economic contraction caused by the current health crisis, security teams need to deliver more with less.
Marie Hattar's picture
Organizations should regularly put security products, processes and people to the test, and the reward is better, more efficient protection against attacks.
John Maddison's picture
Network connections that can change instantaneously in response to shifting business requirements can take a security solution minutes or hours to be reconfigured. And that lag time is prime for exploitation.
Laurence Pitt's picture
Working remotely should be a positive experience. Here are a few simple suggestions that may help during this time of change.
Torsten George's picture
Static passwords lack the ability to verify whether the user accessing data is authentic or just someone who bought a compromised password.