Security Experts:

Security Infrastructure
long dotted


Huawei is at the center of the U.S.-Chinese conflict over Beijing’s technology ambitions, which Washington worries might erode American industrial leadership. [Read More]
US officials moved to cut off Chinese tech giant Huawei from global chipmakers, ramping up sanctions on the company seen by Washington as a national security risk. [Read More]
A coalition of consumer groups filed a complaint Thursday with US regulators claiming the popular video app TikTok has failed to live up to an agreement last year limiting data collection from children. [Read More]
Identity protection provider Venafi is acquiring Jetstack, a company specializing in open source machine identity protection software for Kubernetes. [Read More]
Palo Alto Networks has patched over two dozen vulnerabilities in PAN-OS, including many that have a critical or high severity rating and a few that can be exploited without authentication. [Read More]
VMware has announced the acquisition of Kubernetes security company Octarine and the launch of a new SOC alliance. [Read More]
Code quality and security solutions provider SonarSource has acquired code security testing company RIPS Technologies. [Read More]
Enterprise identity protection company Semperis raises $40 million in a Series B funding round, which it will use to expand globally. [Read More]
CyberArk has acquired Idaptive, an Identity as a Service (IDaaS) provider, for $70 million in cash. [Read More]
Comparitech researchers have discovered that thousands of Android applications distributed through Google Play leak sensitive information due to Firebase misconfigurations. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Marc Solomon's picture
It’s up to humans, guided by instinct, intelligence and experience, to determine the right data, so they can focus on what matters to the organization, make better decisions and take the right actions.
Craig Harber's picture
Many organizations are not aware that their network sensors are improperly or inefficiently deployed because they do not have a full understanding of how to act on the network traffic being collected.
Gunter Ollmann's picture
The philosophy of integrating security practices within DevOps is obviously sensible, but by attaching a different label perhaps we are likely admitting that this “fusion” is more of an emulsification.
John Maddison's picture
A security platform is much more than just wrapping a collection of security tools together into a single bundle and then adding some sort of a shell script so independent management tools appear to be part of a congruent solution.
Jim Ducharme's picture
If there’s one thing you can be sure of about user authentication methods today, it’s that determining the best choice isn’t as simple or straightforward as it used to be.
Preston Hogue's picture
The ability to look deeply into user and system behavior and identify the smallest anomaly will become the essential toolkit to stem the tide of fraud and theft in financial services.
John Maddison's picture
Physical and virtual security appliances traditionally suffer from performance challenges, especially when it comes to critical functions such as inspecting encrypted traffic.
Josh Lefkowitz's picture
As the technology and tools to leverage stolen credentials advance, defenders should seek out innovative new ways to proactively flag exposed passwords leveraging insights gleaned from illicit communities and open-web dumps.
Jim Ducharme's picture
As the workforce continues to evolve, a one-size-fits-all approach won’t work for different identity and access management needs across organizations.
John Maddison's picture
Outpacing your security capacity with digital innovation is a formula for disaster that may take you out of the running in today’s highly competitive digital marketplace entirely.