Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

An Elasticsearch database pertaining to e-learning platform OneClass was found to expose data on over one million students and lecturers. [Read More]
Threat hunting solutions provider Hunters today announced that it closed a $15 million Series A funding round, which brings the total raised by the company to $20.4 million. [Read More]
Many companies view the SOC as a key part of their security strategy, but SOC staff complain about high stress and the lack of proper tools. [Read More]
IBM has disclosed several vulnerabilities affecting powerline extenders from Tenda and says the vendor has ignored its emails and phone calls. [Read More]
Apple has acquired Fleetsmith, a company that specializes in solutions that automate the setup, patching and security of Macs, iPhones, iPads and Apple TV devices. [Read More]
Republican senators have introduced what they have described as a “balanced” bill that would require tech companies to give law enforcement access to encrypted data. [Read More]
Companies believe strong authentication is important, but they still over-rely on passwords and allow their employees to access corporate resources via social media credentials. [Read More]
A top German court has ordered Facebook to stop merging data collected through its Whatsapp and Instagram subsidiaries or other websites unless users explicitly agree, in a legal victory for competition authorities. [Read More]
Microsoft president Brad Smith on Tuesday said Europe was the global leader on setting rules for big tech, two years after the EU implemented the GDPR, its landmark data privacy law. [Read More]
Twitter has informed business users that their billing information may have been exposed through their web browser’s cache. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

John Maddison's picture
The rate at which recent networking changes have had to occur, and the speed at which cybercriminals have been able to respond, teach us clearly what is needed going forward to ensure ongoing proactive cyber protection.
Laurence Pitt's picture
For an MSP looking to grow business, the convergence of SD-WAN and security, along with the transitional needs of customers, translates to opportunity.
Torsten George's picture
With IT budgets being cut back in response to the economic contraction caused by the current health crisis, security teams need to deliver more with less.
Marie Hattar's picture
Organizations should regularly put security products, processes and people to the test, and the reward is better, more efficient protection against attacks.
John Maddison's picture
Network connections that can change instantaneously in response to shifting business requirements can take a security solution minutes or hours to be reconfigured. And that lag time is prime for exploitation.
Laurence Pitt's picture
Working remotely should be a positive experience. Here are a few simple suggestions that may help during this time of change.
Torsten George's picture
Static passwords lack the ability to verify whether the user accessing data is authentic or just someone who bought a compromised password.
Marc Solomon's picture
It’s up to humans, guided by instinct, intelligence and experience, to determine the right data, so they can focus on what matters to the organization, make better decisions and take the right actions.
Craig Harber's picture
Many organizations are not aware that their network sensors are improperly or inefficiently deployed because they do not have a full understanding of how to act on the network traffic being collected.
Gunter Ollmann's picture
The philosophy of integrating security practices within DevOps is obviously sensible, but by attaching a different label perhaps we are likely admitting that this “fusion” is more of an emulsification.