Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Cisco announces the official release and general availability of Snort 3, seven years after the alpha version was unveiled. [Read More]
DNSpooq is the name given to 7 Dnsmasq vulnerabilities that could expose millions of devices to DNS cache poisoning, remote code execution and DoS attacks. [Read More]
FireEye has released an open source tool that checks Microsoft 365 tenants for the use of techniques associated with the SolarWinds hackers. [Read More]
The funds will help Rewind continue expanding its backup-as-a-service (BaaS) offering for more business-critical applications. [Read More]
Swimlane, a provider of security orchestration, automation and response (SOAR) solutions, announced today that it has raised $40 million in funding. [Read More]
In one attack, the cybercriminals found an employee via the company’s chatroom and then convinced them to log into a fake VPN page to reveal their credentials. [Read More]
An expired domain allowed a researcher to hijack the country code top-level domain (TLD) of Congo. [Read More]
Going after high profile victims appears to have allowed Ryuk ransomware operators to build a highly lucrative malware enterprise. [Read More]
WhatsApp on Friday postponed a data-sharing change as users concerned about privacy fled the Facebook-owned messaging service and flocked to rivals Telegram and Signal. [Read More]
The Canadian data security startup closes a Series A funding round to expand its data discovery and classification offerings. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Marc Solomon's picture
To push security operations forward, we must move towards a single, collaborative environment that can include threat hunters, incident handlers and threat intelligence and SOC analysts.
Laurence Pitt's picture
In the world of information security, it’s hard to flip between internet browser tabs without hearing a new term, and one of the biggest in 2020 was Secure Access Service Edge (SASE).
Gunter Ollmann's picture
CISOs and their security teams need to quickly master these technologies if they’re to successfully partner with in-house development teams and secure “data-in-use.”
John Maddison's picture
Multi-vendor environments with disparate security solutions that don’t integrate when deployed make it impossible for organizations to securely use the flexible network environments they need to compete effectively.
Tim Bandos's picture
Keeping a ‘six foot distance’ between our digital home life and digital work life can go a long way when it comes to safeguarding our most sensitive data, too.
Torsten George's picture
Ultimately, organizations must assume that bad actors are already in their networks. And consumers must realize they’re constant targets.
AJ Nash's picture
Knowing that threat intelligence is readily available and proving its worth is one thing, understanding how to use it within your security operations program is quite another.
Laurence Pitt's picture
To reap the benefits of 5G and ensure security, organizations must be smarter, fully educated and willing to work alongside the tech.
John Maddison's picture
SD-WAN connections are designed to constantly shift and adjust, replacing one connection that has become unstable with another without interrupting application performance.
Gunter Ollmann's picture
It is reasonable to assume that within five years the term “confidential compute” will become superfluous and an assumed native component of all cloud services.