Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

New functionality added by Onapsis to its security platform allows SAP customers to check if they are GDPR-compliant [Read More]
NIST publishes second draft of the Framework for Improving Critical Infrastructure Cybersecurity [Read More]
Organizations are getting better at detecting breaches, but attackers are also working on improving their tactics and techniques [Read More]
OpenSSL 1.0.2n patches two vulnerabilities discovered by a Google researcher using the OSS-Fuzz fuzzing service [Read More]
Researchers devise new method, dubbed Process Doppelgänging, that can be leveraged by malware to evade security solutions [Read More]
Researchers show how hackers can stealthily exfiltrate data from air-gapped industrial networks by manipulating the RF signals emitted by a PLC [Read More]
Honeywell study shows many industrial companies are slow to secure their data and operations against cyber threats [Read More]
Mailsploit vulnerabilities allow email spoofing and code injection attacks against over 30 email apps [Read More]
Israel-based anti-phishing firm IRONSCALES raises $6.5 million. Money will be used to expand sales and expedite R&D for its technologies [Read More]
Android security updates for December 2017 patch 47 vulnerabilities, including 10 rated critical [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Travis Greene's picture
Operating with the assumption that you’ve already been hacked makes security incident response planning a priority for the organization.
Josh Lefkowitz's picture
Oil and gas is one of the critical infrastructure sectors that face greater risks and challenges when it comes to security
Josh Lefkowitz's picture
The Deep & Dark Web remains most familiar to cybersecurity and IT teams, but such intelligence can also benefit the mergers and acquisitions (M&A) due diligence process.
Adam Meyer's picture
By including digital risk monitoring as part of your threat intelligence capability, you can better understand your most critical areas of risk and the possible avenues of approach for adversaries.
Ashley Arbuckle's picture
Many organizations are not achieving the full benefits of digital transformation because they lack a comprehensive security program.
Steven Grossman's picture
Planning for cyber protection and resiliency is a large topic that requires the right framework and a balance of strategic and tactical thinking.
Adam Meyer's picture
With sound and timely operational threat intelligence, you can make life a lot harder for adversaries and have a much better understanding of how your organization is positioned against today's cyber threats.
Steven Grossman's picture
A series of events converged during the past few weeks that reemphasized the need for our industry to do a better job of establishing measurable and repeatable processes.
Torsten George's picture
The healthcare industry has experienced an onslaught of cyber-attacks over the last year, primarily driven by the fact that patient records are highly prized assets among cyber criminals.
Adam Meyer's picture
Business executives can benefit from strategic threat intelligence by gaining critical insights and establishing meaningful cybersecurity benchmarks.