Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

IT asset management company Axonius has raised $100 million in Series D funding at more than $1 billion valuation, the company told SecurityWeek. [Read More]
HYAS, a Victoria, Canada-based provider of threat intelligence based on adversary infrastructure, has closed a $16 million Series B round of funding led by S3 Ventures. [Read More]
Bots have emerged amid widespread frustration with the online world of vaccine appointments. [Read More]
Using a new tool called COVIDGUARDIAN, a group of researchers has identified vulnerabilities in more than twenty Android contact tracing apps. [Read More]
NEWS ANALYSIS: Armorblox raises $30 million and joins a growing list of well-heeled startups taking a stab addressing one of cybersecurity’s most difficult problems: keeping malicious hackers out of corporate mailboxes. [Read More]
Full-time Linux kernel maintainers Gustavo Silva and Nathan Chancellor to focus on improving security. [Read More]
In response to a security breach that exposed personal information from unemployment claims, Washington Senate has unanimously passed a measure that creates a state Office of Cybersecurity. [Read More]
Bot protection startup PerimeterX raises $57 million more in new financing to fuel its push into new markets globally. [Read More]
The services of initial access brokers, which sell access to breached organizations to the highest bidder, are increasingly sought-after, with an average price of $7,100. [Read More]
Veteran cybersecurity practitioner and executive Caleb Sima has been tapped to lead security at mobile stock trading startup Robinhood. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

AJ Nash's picture
Knowing that threat intelligence is readily available and proving its worth is one thing, understanding how to use it within your security operations program is quite another.
Laurence Pitt's picture
To reap the benefits of 5G and ensure security, organizations must be smarter, fully educated and willing to work alongside the tech.
John Maddison's picture
SD-WAN connections are designed to constantly shift and adjust, replacing one connection that has become unstable with another without interrupting application performance.
Gunter Ollmann's picture
It is reasonable to assume that within five years the term “confidential compute” will become superfluous and an assumed native component of all cloud services.
Torsten George's picture
Today’s dynamic threatscape requires security professionals to adjust to an ever-expanding attack surface.
Galina Antova's picture
The COVID-19 crisis and its associated constraints has shown us that many of the activities we considered “priorities” before March are not really priorities.
Gunter Ollmann's picture
The phrase “assume breach” has been transformational to enterprise security investment and defensive strategy for a few years but may now be close to retirement.
Justin Fier's picture
Businesses should be emphasizing visibility, early threat detection, and focusing on understanding ‘normal’ activity rather than ‘bad.’
Torsten George's picture
The tactics, techniques, and procedures (TTPs) used in the Twitter attack were not much different than in the majority of other data breaches and serve as valuable lessons for designing a modern cyber defense strategy.
Alastair Paterson's picture
Opportunities for accidental exposure of sensitive information are often compounded by multiple stakeholders using collaborative tools without the proper policies, oversight and security training.