Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Roughly one month after senators introduced a “balanced” bill that would require tech companies to provide law enforcement with access to encrypted user data, a companion bill was introduced in the House of Representatives this week. [Read More]
Cisco has patched critical and high-severity vulnerabilities in its Data Center Network Manager (DCNM) product. [Read More]
The US ambassador in Brasilia warned of "consequences" if Brazil chooses Chinese telecoms company Huawei to develop its 5G network. [Read More]
Identity and access protection provider Ermetic secured $17.25 million in a Series A funding round, which brings the total amount raised by the company to $27.3 million. [Read More]
Source code belonging to Microsoft, Adobe, AMD and tens of other companies has been leaked online after it was found unprotected. [Read More]
The United States and the United Kingdom warned in a joint alert issued this week that a piece of malware has infected over 62,000 QNAP NAS devices. [Read More]
Facebook is asking EU courts to review "exceptionally broad" requests by antitrust regulators there that would scoop up employees' personal information. [Read More]
The creators of the Mooltipass hardware password manager have unveiled Mooltipass Mini BLE, a Bluetooth-enabled version that includes many new and useful features. [Read More]
Australia’s consumer watchdog launched court action against Google on Monday alleging the technology giant misled account holders about its use of their personal data. [Read More]
Department of Energy (DOE) officials issued a report that lays out a blueprint strategy for the development of a national quantum internet. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Torsten George's picture
The tactics, techniques, and procedures (TTPs) used in the Twitter attack were not much different than in the majority of other data breaches and serve as valuable lessons for designing a modern cyber defense strategy.
Alastair Paterson's picture
Opportunities for accidental exposure of sensitive information are often compounded by multiple stakeholders using collaborative tools without the proper policies, oversight and security training.
Laurence Pitt's picture
To minimize the effect of an attack, an automated response is vital, which can reduce the amount of time between infection and resolution.
John Maddison's picture
By combining verifiable trust, intent-based segmentation, and integrated security, organizations can establish a trustworthy, security-driven networking strategy.
Jim Ducharme's picture
Let’s look at some real-world examples of the identity management challenges remote work is creating, and at what it means to rethink identity governance and lifecycle to meet those challenges.
Laurence Pitt's picture
Developing an ROI model takes time – my recommendation would be to focus on a simple security project that will return high value to the business when proven successful.
Torsten George's picture
The integration of identity with security is still work in progress, with less than half of businesses having fully implemented key identity-related access controls according to a research study.
Gunter Ollmann's picture
With a diverse and globally distributed workforce, cybersecurity buying decisions will increasingly factor accessibility, usability, and inclusiveness in solution design and operability.
John Maddison's picture
Smart businesses are learning that SD-WAN can play a critical role in quickly—and securely—rolling out new networking environments, and connecting resources and users to data and applications.
Laurence Pitt's picture
Every business is likely to be subject to cyberattacks at some point, and the option is to either take on the cost of putting measures in place before it happens or paying to clean up after.