Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Researcher earns $5,000 for information disclosure vulnerability found in Google’s intranet login page [Read More]
The latest Joomla update patches a critical SQL injection vulnerability that can be easily exploited by remote attackers [Read More]
More than 200 Brooks Brothers stores hit by payment card breach. Hackers had access to payment processing systems for nearly a year [Read More]
Researchers are confident that the APT3 (Gothic Panda, UPS Team) cyber espionage group is linked to the Chinese Ministry of State Security [Read More]
Public bug bounty program launched for WordPress CMS, WordPress.org websites, BuddyPress, bbPress and GlotPress [Read More]
Join SecurityWeek and Rapid7 for actionable takeaways from penetration testing engagements, and see how customers are combining detection technologies to find intruders earlier in the attack chain. [Read More]
Shadow Brokers are back with a new offer: pay a monthly fee and receive exploits, and data from SWIFT/banks and nuclear programs [Read More]
Hackers breached DocuSign systems and stole email addresses, which they used in a spam campaign designed to deliver malware [Read More]
Experts and vendors warn that industrial control systems (ICS) are also at risk of getting hit by WannaCry ransomware attacks [Read More]
The U.S. government’s General Services Administration (GSA) announced the launch of a bug bounty program with rewards of up to $5,000 [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Danelle Au's picture
When a vendor comes in for a presentation and, after only a few minutes, claims to know precisely what your challenges are and how to solve them, that’s a major red flag for the confident CISO.
Marc Solomon's picture
To harness the power embedded in disparate sources of threat data requires aggregating it and translating it into a uniform format for analysis and action.
Ashley Arbuckle's picture
In a globally interconnected world, knowledge-based economies are shaping our future, and vendor relationships are critical to success.
Torsten George's picture
Hackers are exploiting known vulnerabilities and are betting on the fact that organizations don’t know how to fix what really matters.
Steven Grossman's picture
President Trump's cybersecurity executive order touches on activities that indirectly but significantly impact government agencies’ cyber risk posture.
Josh Lefkowitz's picture
Safeguarding critical assets, proactively addressing cyber and physical threats, and assessing and mitigating risk accurately and effectively requires comprehensive visibility into both the Deep and the Dark Web.
Adam Meyer's picture
Different intelligence consumers in your organization create and consume varying levels of threat intel to take appropriate actions against identified risks.
Joshua Goldfarb's picture
The European Union’s General Data Protection Regulation includes an aspect that seems particularly relevant to the field of security operations and incident response.
Marc Solomon's picture
Security professionals want insights into the adversaries themselves – the tools as well as the tactics, techniques and procedures (TTPs) they’re using – to strengthen defenses and make life much more difficult for the bad guys.
Torsten George's picture
Unfortunately, a significant portion of information security resources are consumed by data gathering and aggregation processes.