Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Researchers find and document a way to leverage Apple’s Find My's Offline Finding network to upload arbitrary data to the Internet. [Read More]
Gartner believes it will be four years before the market achieves two-thirds of the position a WSJ Intelligence and Forcepoint survey says is already achieved on deployment of secure access service edge (SASE). [Read More]
Panaseer banks $26.5 million in Series B funding to build out a Continuous Controls Monitoring (CCM) platform to help organizations identify assets and manage security controls. [Read More]
An inside look at the UK’s ambitious Active Cyber Defense (ACD) program designed to improve the security posture of an entire nation. [Read More]
Last year, the company encountered over 1 million problematic apps and stopped $1.5 billion in potentially fraudulent transactions. [Read More]
Jamf (NASDAQ: JAMF), a provider of enterprise management software for Apple devices, has signed a definitive agreement to acquire Wandera, a provider of zero trust cloud security and access for mobile devices. [Read More]
Cycode, an Israeli startup focused on securing DevOps tools, has raised $20 million in Series A funding. [Read More]
Adobe warns that a "priority 1" security flaw has been exploited in the wild in “limited attacks targeting Adobe Reader users on Windows.” [Read More]
Officials say the Pentagon is reconsidering how to make a massive shift to cloud computing, suggesting the possibility that it could scrap a contract potentially worth $10 billion. [Read More]
In collaboration with the Sigstore project, Google ships an open-source tool called cosign to make signing and verifying container images easy. [Read More]

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Tim Bandos's picture
Shifting to the cloud can be a radical but necessary change. There’s no denying the transition can be time consuming and costly upfront.
Gordon Lawson's picture
While obscurity is an offensive tool for attackers, it also represents a defensive measure for organizations. Let’s consider the benefits of concealing network infrastructure and activity from the outside world to reduce the enterprise attack surface.
William Lin's picture
The combination of “shifting left” and “cloud security” is going to happen and be called “shifting everywhere.”
John Maddison's picture
The best defense in depth strategy is one that enables multiple tools, deployed across the distributed network—including endpoints, clouds, and applications—to work as a unified solution to detect and respond to threats.
William Lin's picture
Data security is a tough topic to summarize and I’d argue it may be the most misunderstood category in security right now.
AJ Nash's picture
Even if the best strategies and policies are created and uniformly agreed upon across all government and private sector domains, none of that will matter if the talent to execute does not exist.
Marc Solomon's picture
Collaboration with teams across the organization to utilize data more efficiently and effectively, dramatically improves detection and response and is critical to achieve enterprise-wide risk management.
Laurence Pitt's picture
Using Machine Learning (ML) with AI means that security tools can be trained to work better with data and the ML system will be able to make recommendations for improvements.
John Maddison's picture
In today’s highly dynamic environments, integration needs to go beyond just the security elements of a platform.
Gunter Ollmann's picture
Once live stomping around vendor-packed expo halls at security conferences returns, it is highly probable that “Virtual Analyst” will play a starring role in buzzword bingo.