Security News > 2020
He has been at Infosys for four years as the chief information security officer. The future is going to be about cyber resilience, and CISOs need to lead the charge to recalibrate how security teams and entire companies think about security.
Live Webinar | More Data, More Problems: Applying the Right Automation to Propel Security Operations
Enterprises must embrace innovation to drive secure value to their organization with automation. The latest buzzword in the security lexicon - automation - has been hailed as the key to fundamentally alter how we manage, analyze and execute.
5G will be the main driver for mobility for this year with the market for 5G infrastructure expected to hit $4.2 billion, with two-thirds of companies deploying 5G in 2020, according to Gartner. Kiang added, "Mainstream 5G adoption will drive innovation, creating new business opportunities across a wide-range of industries. Consumers acclimating to a new-found transformational leap in mobile connectivity will adopt revolutionary new products, services, and solutions that smartly leverage 5G's chief benefits, namely low-latency and speed. In 2020, the development of 5G infrastructure and use-cases will proceed in parallel, and intersect in increasing frequency as the technology matures."
From buzzword to practical application, artificial intelligence quickly has made an impact in cybersecurity - particularly in the security operations center. Bryce Schroeder of ServiceNow projects how AI and automation will continue to influence SOCs - and the analyst's role.
Speaking at the RSA Conference 2020 on Thursday, security technologist Bruce Schneier called for a better cooperation between security experts and government policymakers. From education systems to election structures, society is built on conventional "Models" that made sense when they were first formed hundreds of years ago, said Schneier, a lecturer at the Harvard Kennedy School.
In interviews at RSA 2020, former Department of Homeland Security Secretary Michael Chertoff and Andy Purdy, CSO for Huawei USA, offer different points of view on 5G security. With the U.S. late to the 5G race, Chertoff says that America needs to work more closely with its allies and telecom equipment makers in Europe and Asia to make next-generation technology that competes with equipment from China's Huawei more price competitive as well as improve security.
For years, Humble Bundle has been selling great books at a "Pay what you can afford" model. This month, they're featuring as many as nineteen cybersecurity books for as little as $1, including four of mine.
A serious vulnerability affecting Apache Tomcat can be exploited to read files from a server and in some cases even to achieve remote code execution. Chaitin says the vulnerability is related to the Apache JServ Protocol protocol, which is designed to improve performance by proxying inbound requests from a web server through to an application server.
Scott Matteson: How are organizations misusing their firewalls? Matt Glenn: The first thing organizations need to do is recognize that firewalls can help with many security challenges, but they should not be used to solve everything.
Always stay alert to potential security attacks on mobile devices. Aaron Turner, president and chief security officer of Highside, a distributed identity and secure collaboration technology company, said hardened Android devices are preferred over iOS devices, because iOS devices rely on a single-point-of-failure security model and don't allow users to select which encryption roots their device trusts.