Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Check Point’s ZoneAlarm forum has been breached and the details of thousands of users have been leaked. [Read More]
The allegations of spying by former Twitter employees for Saudi Arabia underscore the risks for Silicon Valley firms holding sensitive data which make the platforms ripe for espionage. [Read More]
Whistleblowers and digital pioneers have long been sounding the alarm about abuses of our privacy online, and tech entrepreneurs are bidding to turn growing consciousness about the problem into a money-making industry. [Read More]
Cisco patches multiple vulnerabilities across products such as Small Business Routers, TelePresence Collaboration Endpoint, RoomOS, and others. [Read More]
Ecommerce fraud prevention solutions provider Riskified has raised $165 million in a Series E funding round at a valuation of over $1 billion. [Read More]
Google this week announced a partnership with several security solutions providers, aimed at fighting bad applications in the Android ecosystem. [Read More]
Leaked documents from a civil suit against Facebook show how the social network aimed to employ user data as a tool for bargaining and to manipulate competitors. [Read More]
A new report from Booz Allen captures what the defense contractor is seeing across a complex cyber landscape, and identifies the necessary actions to remain resilient to continuously evolving threats and leverage security as a business enabler. [Read More]
Facebook says 100 third-party application developers continued to access user information via the Groups API even after access to the data was restricted. [Read More]
VMware unveils new security features and enhancements for its NSX, SD-WAN and Secure State products, along with a new zero trust architecture for digital workspaces. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Craig Harber's picture
Because attackers will exploit the paths of least resistance and move laterally through the enterprise, visibility must include all managed and unmanaged assets (enterprise IoT, shadow IoT, legacy systems, etc.)
John Maddison's picture
Security-Driven Networking is a new, strategic approach to security that enables the seamless expansion of network environments and services without ever compromising on security.
Jim Ducharme's picture
In just about every case of digital identity, there seems to be a set of credential recovery mechanisms that are weaker than the authentication method itself.
Torsten George's picture
Organizations should recognize that not all authenticators are equally vulnerable to the mechanisms used to break the trust chain, which range from simple guesswork to coercion.
Laurence Pitt's picture
Adoption of 5G not only exposes potential new attack surfaces, but given execution happens at super-speed, it also changes the required nature of any defense.
John Maddison's picture
A single, cross-platform security strategy ensures that your cloud security deployment doesn’t replicate the challenges of complexity, siloed solutions, and solution sprawl faced in traditional network security environments.
Gunter Ollmann's picture
The faster in-house network administrators can transition to becoming public cloud network security engineers, architects, or analysts, the faster their organizations can implement digital transformation.
Jim Gordon's picture
The decisions platform companies make have profound impacts on every single CISO on the planet, and we need more CISOs speak up. If your enterprise has the opportunity to engage with platform companies– do so.
Jim Ducharme's picture
Now is the time to evaluate what methods of authentication will best serve your organization on the path to a passwordless future.
Preston Hogue's picture
Applications have been deconstructed to the point where we need to think about them with a new level of abstraction to understand how security needs to evolve.