Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Please join us for an interactive webcast on April 28 to learn how to improve the resiliency of your organization's strategic risk management and business operation. [Read More]
Internet security experts have set up "Project Honey Train" with an online railway control system as bait, hoping to "get inside the heads of cyber criminals" -- but without the real-life casualties. [Read More]
Mozilla has unveiled a new, cross platform memory inspection library that can be integrated into its Mozilla InvestiGator (MIG) endpoint security system. [Read More]
A steady stream of low-level cyber attacks poses the most likely danger to the United States rather than a potential digital "armageddon," US intelligence director James Clapper said. [Read More]
Industry professionals applauded the steps by the White House to promote cyber threat information sharing, but an executive order can only go so far and more is needed than just information sharing to combat sophisticated cyber attacks, experts said. [Read More]
Please join us on Tuesday, Feb. 3rd at 1PM ET for a special webcast: How To Avoid Being Tomorrow's Headline: Mitigating Insider Threats and Breaches, presented by Centrify. [Read More]
Enterprises have identified the weak link in the chain in endpoint security - and if you are an end user, that weak link is probably you, according to a new survey. [Read More]
Security experts discuss the implications of the new version of the Payment Card Industry Data Security Standard as the New Year dawns. [Read More]
Security experts weigh in on what they would like to see in 2015 to make their jobs wrangling users, infrastructure, and data easier. [Read More]
South Korea's nuclear power plant operator launched a two-day drill to test its ability to thwart a cyber attack, after a series of online information leaks by a suspected hacker. [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Tim Layton's picture
By understanding your adversaries’ activity on the Dark Web , you can take more of a proactive approach that helps reduce uncertainty and improves overall cyber resiliency.
Alastair Paterson's picture
As security professionals, it’s our job to enable business while protecting it; embracing social media is an imperative, but we also need to mitigate the exploitation of what our organizations reveal online.
Joshua Goldfarb's picture
Every organization will have its limitations and resource constraints. But that doesn’t mean the organization should aim solely for "good enough" security.
Wade Williamson's picture
Specific malicious payloads, URLs and IP addresses are so ephemeral that they may only be used once in the case of a true targeted attack. Intelligence should make you better prepared to evaluate and solve new problems that you haven’t encountered before.
Travis Greene's picture
To understand why return on Access Governance is lower versus other security technologies, we first need to understand why Access Governance is implemented in the first place.
Rafal Los's picture
Security is the ultimate exercise in process efficiency. When process maturity is out of sync, the organization is likely wasting money, time, and precious human talent and not increasing security.
Jim Ivers's picture
Hackers are creative by nature, so you have to use your imagination to think like one. Once you can see your organization from a hacker’s point-of-view, you will be equipped to defend your organization like a security pro.
Torsten George's picture
The DHS initiated the Continuous Diagnostics and Mitigation program to safeguard and secure Federal Information Technology networks. But can the DHS CDM program really strengthen the security posture of government networks?
Jason Polancich's picture
Companies that engage in periodic or annual cyber risk assessments and feel comfortable with results are flirting with disappointment - and maybe even disaster.
Torsten George's picture
The broad reach of GRC solutions creates a unique set of deployment challenges from both a technical and business perspective. This raises the question – how can organizations avoid common GRC pitfalls?