Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

White hat hackers show how easy it is to bypass the iris recognition system on Samsung’s Galaxy S8 smartphones [Read More]
WikiLeaks detailed Athena, a malware developed by the CIA with a U.S. offensive-driven cybersecurity firm. The tool works on all versions of Windows [Read More]
Medical devices also infected with WannaCry ransomware. Several manufacturers release security advisories [Read More]
Researcher earns $5,000 for information disclosure vulnerability found in Google’s intranet login page [Read More]
The latest Joomla update patches a critical SQL injection vulnerability that can be easily exploited by remote attackers [Read More]
Researchers are confident that the APT3 (Gothic Panda, UPS Team) cyber espionage group is linked to the Chinese Ministry of State Security [Read More]
Public bug bounty program launched for WordPress CMS, WordPress.org websites, BuddyPress, bbPress and GlotPress [Read More]
Join SecurityWeek and Rapid7 for actionable takeaways from penetration testing engagements, and see how customers are combining detection technologies to find intruders earlier in the attack chain. [Read More]
Shadow Brokers are back with a new offer: pay a monthly fee and receive exploits, and data from SWIFT/banks and nuclear programs [Read More]
Experts and vendors warn that industrial control systems (ICS) are also at risk of getting hit by WannaCry ransomware attacks [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Adam Meyer's picture
Business executives can benefit from strategic threat intelligence by gaining critical insights and establishing meaningful cybersecurity benchmarks.
Ashley Arbuckle's picture
In a globally interconnected world, knowledge-based economies are shaping our future, and vendor relationships are critical to success.
Torsten George's picture
Hackers are exploiting known vulnerabilities and are betting on the fact that organizations don’t know how to fix what really matters.
Josh Lefkowitz's picture
Safeguarding critical assets, proactively addressing cyber and physical threats, and assessing and mitigating risk accurately and effectively requires comprehensive visibility into both the Deep and the Dark Web.
Adam Meyer's picture
Different intelligence consumers in your organization create and consume varying levels of threat intel to take appropriate actions against identified risks.
Steven Grossman's picture
Without visibility into your information assets, their value, where they live, how they relate to each other and who has access to them, any strategy for protection would be inherently incomplete and ineffective.
Josh Lefkowitz's picture
Digital risk monitoring is a helpful tool for organizations that already have rich intelligence and not just data. Failing to distinguish between the two can be problematic.
Josh Lefkowitz's picture
Executive protection and physical security teams must leverage cyber threat intelligence to gain visibility into all relevant cyber and physical threats and ensure open collaboration and information sharing with all business functions.
Travis Greene's picture
If there are only five controls that a security organization can reasonably tackle this year, what should they be?
Torsten George's picture
Cyber security and cyber threats are most often confused with cyber risk, and often used interchangeably, but they are worlds apart.