Security News > 2020
In this podcast recorded at RSA Conference 2020, we're joined by Ehsan Foroughi, Vice President of Products from Security Compass, an application security expert with 13+ years of management and technical experience in security research. Most companies know that they need proactive security like threat modeling, risk assessments, security training.
An approach to network security that will enhance the effectiveness and timeliness of protection against adversarial intrusion and evasion strategies, has been identified by the Army's corporate laboratory researchers in collaboration with the University of California, Riverside. To rapidly protect Army systems from attack in ways that don't require massive amounts of manual intervention, the researchers have developed and approach called SymTCP. What is SymTCP?
Passwords remain the dominant method of authentication and top cause of data breaches, according to MobileIron. "The digital workplace is driving transformation within organizations of all sizes as employees are increasingly accessing business apps and data from locations outside of their offices and homes," said Steve Brasen, research director of endpoint and identity management at EMA. "At the same time, mobile threats are increasing. More than 60 percent of respondents indicated their organization had experienced a security breach in just the last year. Organizations need to implement context-aware security and passwordless authentication to dynamically adapt to modern threats while removing the friction that is inhibiting end user productivity."
The DoH capability is designed to protect and augment the existing DNS infrastructure investment for service providers. Security and visibility - A10 provides secure application services to protect DNS infrastructure from multiple attack vectors, these are extended with the DoH capability.
Aruba, a Hewlett Packard Enterprise company, announced that its full family of high performance indoor Wi-Fi 6 access points - including the Aruba 500 Series, 510 Series, 530 Series and 550 Series APs - have achieved Wi-Fi CERTIFIED 6 certification from the Wi-Fi Alliance, making it the industry's first full family of Wi-Fi 6 indoor APs to be certified based on the Wi-Fi Alliance Wi-Fi 6 testbed of products. The Wi-Fi CERTIFIED 6 certification is designed to distinguish Wi-Fi 6 products and networks that meet the highest standards for security and interoperability to deliver exceptional end user experiences and wireless stability.
Accenture has acquired Context Information Security, a leading cyber defense consultancy, previously owned by parent company Babcock International Group. Founded in 1998 and headquartered in London, Context is one of the most recognizable and respected information security service providers in the U.K. and in global financial services.
To celebrate International Women's Day we invite you to this all-female splinter episode. We discuss privacy, biometrics, machine learning, social media, getting into cybersecurity and, of course, what it's like to be a woman in tech.
Kali Linux evolution: What's next for the open source pentesting Linux distro?The Kali open source project is funded and maintained by Offensive Security and Kali development is decided on and performed by a very small core team. Exploring the impact that hybrid cloud is having on enterprise security and IT teamsWhile enterprises rapidly transition to the public cloud, complexity is increasing, but visibility and team sizes are decreasing while security budgets remain flat to pose a significant obstacle to preventing data breaches, according to FireMon's 2020 State of Hybrid Cloud Security Report.
Gov domain names is enacting new requirements for validating the identity of people requesting them. Gov domains to hoodwink Americans likely would not be deterred by such concerns.
Supply chain risk, security in the cloud, zero trust - these were three of the hottest topics at RSA Conference. They were discussed candidly - and with some humor - when thought-leaders Edna Conway and Wendy Nather entered ISMG Studios.