Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Applying micro-segmentation to endpoints can help stop attackers from moving laterally within an organization after the initial breach. [Read More]
The United States is taking additional steps toward serving .gov domains over encrypted connections, and this week laid out plans to preload the entire top-level domain (TLD). [Read More]
Apple has announced several new privacy and security features at its 2020 Worldwide Developers Conference (WWDC). [Read More]
BlueLeaks: Distributed Denial of Secrets has leaked hundreds of thousands of files belonging to over 200 law enforcement agencies, obtained by Anonymous hackers from a web development firm. [Read More]
Microsoft has announced improved identity and access management protections for AccountGuard users in the United States, ahead of the 2020 elections. [Read More]
France's highest administrative authority on Friday dismissed a challenge by Google against a fine of 50 million euros ($56 million) for failing to provide adequate information on its data consent policies. [Read More]
A high-severity vulnerability found in IBM’s Maximo asset management product makes it easier for hackers to move around in enterprise networks. [Read More]
Microsoft has extended the protection capabilities of Microsoft Defender Advanced Threat Protection (ATP) with the addition of a UEFI scanner. [Read More]
Zoom announced that it will offer end-to-end encryption to free users as long as they provide a phone number to verify their account. [Read More]
An analysis of the “Official Trump 2020” application revealed that keys to various parts of the app were being exposed to attacks. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

John Maddison's picture
A security platform is much more than just wrapping a collection of security tools together into a single bundle and then adding some sort of a shell script so independent management tools appear to be part of a congruent solution.
Jim Ducharme's picture
If there’s one thing you can be sure of about user authentication methods today, it’s that determining the best choice isn’t as simple or straightforward as it used to be.
Preston Hogue's picture
The ability to look deeply into user and system behavior and identify the smallest anomaly will become the essential toolkit to stem the tide of fraud and theft in financial services.
John Maddison's picture
Physical and virtual security appliances traditionally suffer from performance challenges, especially when it comes to critical functions such as inspecting encrypted traffic.
Josh Lefkowitz's picture
As the technology and tools to leverage stolen credentials advance, defenders should seek out innovative new ways to proactively flag exposed passwords leveraging insights gleaned from illicit communities and open-web dumps.
Jim Ducharme's picture
As the workforce continues to evolve, a one-size-fits-all approach won’t work for different identity and access management needs across organizations.
John Maddison's picture
Outpacing your security capacity with digital innovation is a formula for disaster that may take you out of the running in today’s highly competitive digital marketplace entirely.
Gunter Ollmann's picture
CISOs are increasingly cognizant of the value deep integration of threat intelligence can bring to cloud protection platforms and bottom-line operational budgets.
Torsten George's picture
Perimeter-based security, which focuses on securing endpoints, firewalls, and networks, provides no protection against identity- and credential-based threats.
Preston Hogue's picture
Retailers should ensure that they are proactively scanning for vulnerabilities in the website, as well as deploying a solution to monitor traffic.