Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

A publicly accessible, unprotected database belonging to car dealership marketing firm Dealer Leads was found to expose 198 million records, including personally identifiable information. [Read More]
IBM launches z15 mainframe with new capabilities designed to protect sensitive data across hybrid multi-cloud environments. [Read More]
NETGEAR patches DoS vulnerabilities found by Cisco researchers in its N300 series wireless routers. [Read More]
The attack traffic recorded by F-Secure's global network of honeypots tripled from the last six months of 2018 to the first six months of 2019. [Read More]
Cloud security firm Lacework has closed a $42 Million Series C funding round from Sutter Hill Ventures and Liberty Ventures, bringing the total raised to $74 million. [Read More]
Trustwave researchers discovered five new credential leaking vulnerabilities, two in a D-Link DSL modem and three in multiple Comba Telecom WiFi devices. [Read More]
In an attempt to improve the privacy and security of its users, Google is getting ready to bring DNS-over-HTTPS (DoH) to the Chrome browser. [Read More]
Researchers disclose NetCAT, a new side-channel attack method that can be exploited to steal sensitive data from remote servers powered by Intel CPUs with DDIO technology. [Read More]
Any new technology or infrastructure, such as software defined wide area network (SD-WAN), will almost always expand the cybersecurity attack surface. [Read More]
Threat intelligence sharing and cyber fusion firm Cyware has raised $3 million in seed funding led by Emerald Development Managers [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Seema Haji's picture
Enormous bandwidth increases of 5G, the rapid expansion of edge computing and countless new IoT devices introduce risk despite their intended benefit.
John Maddison's picture
Many cybersecurity companies claim to have introduced AI capabilities into their solutions, but most fall short of true AI because their underlying infrastructure is too small or their learning models are incomplete.
Jim Ducharme's picture
If you want to succeed with FIDO, you have to be ready. Now is the time to assess your organization’s authentication needs, how they are evolving, and the dynamics of your user population.
Jim Gordon's picture
Individuals and security professionals should have a 360 mindset and know the actions needed to take in the pursuit of data protection and the preservation of privacy.
Ashley Arbuckle's picture
While we can’t turn our attention away from gathering data, we must devise new ways to deal with the onslaught of data. Humans simply can’t keep up, and the problem is getting worse.
Preston Hogue's picture
The best way for the security industry to meet the challenge of modern applications and modern app development is to adopt a modern way of supporting those from a security perspective.
Justin Fier's picture
As executives, developers, security teams, and third-party vendors struggle to exert their influence on digital transformation, threat-actors are exploiting the chaos for their own gain.
Ashley Arbuckle's picture
Breach and Attack Simulation (BAS) tools aid in maintaining a fundamental level of security assurance more quickly and cost effectively than traditional approaches.
John Maddison's picture
Analyzing threat trends can provide security professionals with insights into how to better protect their organizations from the latest cyber threats.
Gunter Ollmann's picture
While cloud SIEM may be new for most organizations, its ability to harness the innate capabilities of public cloud are transforming security operations.