Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

EFF warns of sophisticated spear-phishing attacks targeting Internet freedom NGOs “Fight for the Future” and “Free Press” [Read More]
DNSSEC key rollover delayed by at least one quarter as millions of users could go offline due to the failure of some network operators to install the new key [Read More]
Researchers claim Apple silently patched a macOS vulnerability that can be exploited to bypass quarantine and execute JavaScript code [Read More]
Third-party risk and understanding that risk continues to grow; but mitigation of the risk is, if anything, getting worse. [Read More]
Privacy-focused communications app Signal is working on improving protection for contact information using Intel SGX technology [Read More]
While critical infrastructure has been targeted by sophisticated threat actors, attacks involving commonly available tools, such as DDoS, are more likely, says Europol [Read More]
Cisco closes backdoor that could have allowed hackers with access to its data centers to hijack customers’ Umbrella virtual appliances [Read More]
Analysis of 21 popular mobile stock trading apps revealed the existence of several vulnerabilities and the lack of important security features [Read More]
Cloudflare says all customers will receive unmetered DDoS mitigation, and organizations will be able to select the geographical location of their SSL keys [Read More]
Unsigned apps can steal passwords from the macOS keychain, researcher warns. Issue affects several versions of OS, including High Sierra [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Steven Grossman's picture
A series of events converged during the past few weeks that reemphasized the need for our industry to do a better job of establishing measurable and repeatable processes.
Torsten George's picture
The healthcare industry has experienced an onslaught of cyber-attacks over the last year, primarily driven by the fact that patient records are highly prized assets among cyber criminals.
Adam Meyer's picture
Business executives can benefit from strategic threat intelligence by gaining critical insights and establishing meaningful cybersecurity benchmarks.
Ashley Arbuckle's picture
In a globally interconnected world, knowledge-based economies are shaping our future, and vendor relationships are critical to success.
Torsten George's picture
Hackers are exploiting known vulnerabilities and are betting on the fact that organizations don’t know how to fix what really matters.
Josh Lefkowitz's picture
Safeguarding critical assets, proactively addressing cyber and physical threats, and assessing and mitigating risk accurately and effectively requires comprehensive visibility into both the Deep and the Dark Web.
Adam Meyer's picture
Different intelligence consumers in your organization create and consume varying levels of threat intel to take appropriate actions against identified risks.
Steven Grossman's picture
Without visibility into your information assets, their value, where they live, how they relate to each other and who has access to them, any strategy for protection would be inherently incomplete and ineffective.
Josh Lefkowitz's picture
Digital risk monitoring is a helpful tool for organizations that already have rich intelligence and not just data. Failing to distinguish between the two can be problematic.
Josh Lefkowitz's picture
Executive protection and physical security teams must leverage cyber threat intelligence to gain visibility into all relevant cyber and physical threats and ensure open collaboration and information sharing with all business functions.