Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Study conducted by Accenture and AMA shows that a majority of physicians in the US have experienced a cybersecurity incident, including phishing, malware and inappropriate access by insiders [Read More]
Google’s Ian Beer releases iOS 11 exploit that can be used for jailbreaks to help security researchers analyze Apple devices [Read More]
After getting complaints from developers, Google is evaluating whether it should continue allowing innovative use of accessibility services by Android apps [Read More]
Microsoft used the same certificate for all instances of its Dynamics 365 ERP product and it took more than 100 days to take action, but the company claims the issue posed little risk [Read More]
Synaptics touchpad driver present on hundreds of HP laptops includes keylogging functionality. Patches available for a majority of affected devices [Read More]
New functionality added by Onapsis to its security platform allows SAP customers to check if they are GDPR-compliant [Read More]
NIST publishes second draft of the Framework for Improving Critical Infrastructure Cybersecurity [Read More]
Organizations are getting better at detecting breaches, but attackers are also working on improving their tactics and techniques [Read More]
OpenSSL 1.0.2n patches two vulnerabilities discovered by a Google researcher using the OSS-Fuzz fuzzing service [Read More]
Researchers devise new method, dubbed Process Doppelgänging, that can be leveraged by malware to evade security solutions [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Torsten George's picture
We need to consider whether traditional approaches to vulnerability management are still viable and if just upgrading existing methods or tools is sufficient.
Adam Meyer's picture
It’s that time of year again when we look back at the past year and try to anticipate what we can expect in the coming year. Here is my cybersecurity forecast for 2018.
Preston Hogue's picture
Working closely with business groups throughout the process of due diligence fulfills the CISO’s responsibilities and creates a more security-savvy business.
Josh Lefkowitz's picture
It’s crucial to recognize that 2018 will very likely be yet another year of increasingly complex and damaging threats and incidents, which is why we must always build upon and further enhance our intelligence strategies.
Oliver Rochford's picture
Compared to the perception that security inhibits productivity and innovation, the reality is bad security has a far greater negative impact.
Josh Lefkowitz's picture
When key decision-makers broaden their mindsets and strategies pertaining to the value and function of intelligence, their organizations can become better positioned to mitigate the cyber and physical risks they face.
Justin Fier's picture
When third-parties are integrated onto the network, threats are bound to slip through the cracks, and the Equifax hack demonstrated how easy it is for a subtle threat to develop into a debilitating data breach.
Josh Lefkowitz's picture
Business Risk Intelligence (BRI) can help inform their decisions, gain a decision advantage over adversaries, and mitigate a broad spectrum of cyber and physical risks.
Lance Cottrell's picture
While mergers and acquisitions (M&A) are generally known for bringing economic growth and opportunity, people are beginning to realize that the process also brings serious cybersecurity risks.
Alastair Paterson's picture
With greater awareness about POS system attacks, operations against third-party suppliers, and the vulnerabilities of public or semi-public Wi-Fi networks, companies can do a lot to mitigate risk and ensure safer journeys for travelers.