Security Experts:

Security Infrastructure
long dotted


Cyber warriors on NATO's eastern edge are warning that the growing number of people working from home globally due to the pandemic is increasing vulnerability to cyber attacks. [Read More]
DevSecOps and risk management solutions provider apiiro on Tuesday emerged from stealth mode with $35 million in funding. [Read More]
Online infrastructure security solutions provider Cyberpion on Tuesday emerged from stealth mode after raising $8.25 million in seed funding. [Read More]
A scan of 2,200 virtual appliance images revealed the existence of over 400,000 vulnerabilities, including in the appliances of major vendors. [Read More]
Cloudflare announces Cloudflare One, a new cloud-based network-as-a-service solution designed to help organizations ensure that their systems remain secure while their employees work remotely. [Read More]
Network security company Illusive Networks has raised $24 million in a Series B1 funding round. [Read More]
Cloud security company Accurics raised $20 million across seed and Series A funding rounds in the past six months. [Read More]
New additions to Juniper's portfolio are designed to provide that visibility and control by bringing security to every point of connection and allowing CISOs to know who and what is on the network. [Read More]
The Internet Engineering Task Force (IETF) has published RFC8915, its proposed standard for network time security (NTS). [Read More]
Cisco this week announced plans to acquire Kubernetes-native security platform Portshift. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Galina Antova's picture
The COVID-19 crisis and its associated constraints has shown us that many of the activities we considered “priorities” before March are not really priorities.
Gunter Ollmann's picture
The phrase “assume breach” has been transformational to enterprise security investment and defensive strategy for a few years but may now be close to retirement.
Justin Fier's picture
Businesses should be emphasizing visibility, early threat detection, and focusing on understanding ‘normal’ activity rather than ‘bad.’
Torsten George's picture
The tactics, techniques, and procedures (TTPs) used in the Twitter attack were not much different than in the majority of other data breaches and serve as valuable lessons for designing a modern cyber defense strategy.
Alastair Paterson's picture
Opportunities for accidental exposure of sensitive information are often compounded by multiple stakeholders using collaborative tools without the proper policies, oversight and security training.
Laurence Pitt's picture
To minimize the effect of an attack, an automated response is vital, which can reduce the amount of time between infection and resolution.
John Maddison's picture
By combining verifiable trust, intent-based segmentation, and integrated security, organizations can establish a trustworthy, security-driven networking strategy.
Jim Ducharme's picture
Let’s look at some real-world examples of the identity management challenges remote work is creating, and at what it means to rethink identity governance and lifecycle to meet those challenges.
Laurence Pitt's picture
Developing an ROI model takes time – my recommendation would be to focus on a simple security project that will return high value to the business when proven successful.
Torsten George's picture
The integration of identity with security is still work in progress, with less than half of businesses having fully implemented key identity-related access controls according to a research study.