Security News > 2020

Infosys CISO: Being good at technology is no longer enough
2020-02-28 21:08

He has been at Infosys for four years as the chief information security officer. The future is going to be about cyber resilience, and CISOs need to lead the charge to recalibrate how security teams and entire companies think about security.

Live Webinar | More Data, More Problems: Applying the Right Automation to Propel Security Operations
2020-02-28 21:03

Enterprises must embrace innovation to drive secure value to their organization with automation. The latest buzzword in the security lexicon - automation - has been hailed as the key to fundamentally alter how we manage, analyze and execute.

5 top 5G trends for 2020
2020-02-28 20:53

5G will be the main driver for mobility for this year with the market for 5G infrastructure expected to hit $4.2 billion, with two-thirds of companies deploying 5G in 2020, according to Gartner. Kiang added, "Mainstream 5G adoption will drive innovation, creating new business opportunities across a wide-range of industries. Consumers acclimating to a new-found transformational leap in mobile connectivity will adopt revolutionary new products, services, and solutions that smartly leverage 5G's chief benefits, namely low-latency and speed. In 2020, the development of 5G infrastructure and use-cases will proceed in parallel, and intersect in increasing frequency as the technology matures."

#5G
AI's Impact on SOC Maturity
2020-02-28 20:33

From buzzword to practical application, artificial intelligence quickly has made an impact in cybersecurity - particularly in the security operations center. Bryce Schroeder of ServiceNow projects how AI and automation will continue to influence SOCs - and the analyst's role.

Bruce Schneier Proposes ‘Hacking Society’ for a Better Tomorrow
2020-02-28 20:06

Speaking at the RSA Conference 2020 on Thursday, security technologist Bruce Schneier called for a better cooperation between security experts and government policymakers. From education systems to election structures, society is built on conventional "Models" that made sense when they were first formed hundreds of years ago, said Schneier, a lecturer at the Harvard Kennedy School.

5G Security: Former DHS Leader and Huawei CSO Offer Views
2020-02-28 20:03

In interviews at RSA 2020, former Department of Homeland Security Secretary Michael Chertoff and Andy Purdy, CSO for Huawei USA, offer different points of view on 5G security. With the U.S. late to the 5G race, Chertoff says that America needs to work more closely with its allies and telecom equipment makers in Europe and Asia to make next-generation technology that competes with equipment from China's Huawei more price competitive as well as improve security.

Humble Bundle's 2020 Cybersecurity Books
2020-02-28 19:53

For years, Humble Bundle has been selling great books at a "Pay what you can afford" model. This month, they're featuring as many as nineteen cybersecurity books for as little as $1, including four of mine.

Apache Tomcat Affected by Serious 'Ghostcat' Vulnerability
2020-02-28 19:31

A serious vulnerability affecting Apache Tomcat can be exploited to read files from a server and in some cases even to achieve remote code execution. Chaitin says the vulnerability is related to the Apache JServ Protocol protocol, which is designed to improve performance by proxying inbound requests from a web server through to an application server.

How organizations are misusing firewalls (and what IT teams should do about it)
2020-02-28 19:27

Scott Matteson: How are organizations misusing their firewalls? Matt Glenn: The first thing organizations need to do is recognize that firewalls can help with many security challenges, but they should not be used to solve everything.

Don't be like Bezos: How to keep your phone from being hacked
2020-02-28 19:07

Always stay alert to potential security attacks on mobile devices. Aaron Turner, president and chief security officer of Highside, a distributed identity and secure collaboration technology company, said hardened Android devices are preferred over iOS devices, because iOS devices rely on a single-point-of-failure security model and don't allow users to select which encryption roots their device trusts.