Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

RSA improves several products and launches new services as it unveils its Business-Driven Security offering [Read More]
Microsoft unveiled several new security capabilities in Office 365, including Office 365 Secure Score, Threat Intelligence Private Preview, and Advanced Data Governance Preview. [Read More]
New study shows that companies in the US, UK and Germany are increasingly interested in taking out cyber insurance [Read More]
Study by Google, Mozilla and others shows that antiviruses and middleboxes weaken HTTPS security and introduce vulnerabilities [Read More]
Absolute extends endpoint security self-healing capabilities to third-party applications [Read More]
Darknet marketplace Hansa launches bug bounty program and offers up to 10 bitcoins for vulnerabilities [Read More]
Cybercriminals are increasingly using dark web forums to recruit insiders that can help them make a profit [Read More]
Exabeam goes to battle against players such as Splunk, ArcSight and QRadar with new security intelligence platform. [Read More]
Printers from various vendors are affected by vulnerabilities that can be exploited for DoS attacks, stealing sensitive data and accessing enterprise networks [Read More]
The cyber threat environment in Europe is intensifying dramatically, with growing concerns about cyber attacks on critical infrastructure, according the results of a preparedness survey of 750 European clients by Marsh & McLennan. [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Torsten George's picture
Let’s consider whether the proposed principles and tools by the World Economic Forum (WEF) can improve cyber resilience, and which types of enterprises can benefit most from implementing them.
Erin O’Malley's picture
Today, we expect ultimate convenience. But at what cost? More and more, I’m left wondering whether modern conveniences—grâce à today’s advanced technologies—are truly worth the risk.
Rafal Los's picture
Do you ever find yourself trying to protect your organization from exotic attack scenarios that are highly unlikely or that would have a minimal impact on you?
Josh Lefkowitz's picture
It's crucial for healthcare institutions to recognize their industry’s inherent susceptibility to cyber threats and that standards and regulations will, by their nature, always be reactive.
Steven Grossman's picture
The goal of stopping all cyber attacks and preventing all business impact has been recognized as a fool’s errand, and has shifted to measuring risk and minimizing business impacts.
Torsten George's picture
Since most IoT devices and microservices lack adequate security frameworks or tools to monitor and detect security gaps, traditional methods such as penetration testing should be reconsidered despite their hefty price tag.
Torsten George's picture
Faced with hundreds, thousands, and even hundreds of thousands of vulnerabilities across their IT infrastructures leaves security practitioners at a virtually insurmountable disadvantage.
Travis Greene's picture
Unlike the political arena, or even other divisions of the technology industry, when working in IT security, people rarely notice when everything is done perfectly.
Josh Lefkowitz's picture
The pivotal role of cybersecurity during the recent United States presidential election has underscored the critical need to focus on a secure electoral process.
Eddie Garcia's picture
To reduce the chances of falling victim to an insider-driven breach, security and risk professionals should start by learning what their available data can tell them.