Security Experts:

long dotted


IAM solutions provider Centrify launches bug bounty program via Bugcrowd with rewards of up to $3,000 per vulnerability [Read More]
Flashpoint's mid-year Business Risk Intelligence Report analyzes data from geopolitics and the deep and dark web to show how threat actors and their motivations have evolved over the first six months of 2017. [Read More]
US-CERT has issued an alert to warn organizations of North Korea’s Hidden Cobra activity, particularly one of its DDoS botnets [Read More]
Several flaws at risk of being exploited, including ones disclosed by Shadow Brokers, have been patched by Microsoft in Windows XP and other older versions of the OS [Read More]
An analysis of 35,000 companies around the world showed that thousands of them have failed to update the software running on a majority of their computers [Read More]
Cisco’s Prime Data Center Network Manager (DCNM) product is affected by two critical vulnerabilities introduced by a default account and a debug tool [Read More]
Critical authentication bypass vulnerability exposes many WiMAX routers to remote attacks. Patches unlikely any time soon [Read More]
Popular chat platforms such as Slack, Discord and Telegram can be abused by malicious actors for C&C communications [Read More]
Many industrial firms admitted experiencing at least one security incident in the past 12 months, and large companies said such incidents cost them $500,000 per year [Read More]
Router and switch LEDs can be used to stealthily exfiltrate sensitive data from air-gapped computers, researchers demonstrate [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Adam Meyer's picture
With sound and timely operational threat intelligence, you can make life a lot harder for adversaries and have a much better understanding of how your organization is positioned against today's cyber threats.
Steven Grossman's picture
A series of events converged during the past few weeks that reemphasized the need for our industry to do a better job of establishing measurable and repeatable processes.
Torsten George's picture
The healthcare industry has experienced an onslaught of cyber-attacks over the last year, primarily driven by the fact that patient records are highly prized assets among cyber criminals.
Adam Meyer's picture
Business executives can benefit from strategic threat intelligence by gaining critical insights and establishing meaningful cybersecurity benchmarks.
Ashley Arbuckle's picture
In a globally interconnected world, knowledge-based economies are shaping our future, and vendor relationships are critical to success.
Torsten George's picture
Hackers are exploiting known vulnerabilities and are betting on the fact that organizations don’t know how to fix what really matters.
Josh Lefkowitz's picture
Safeguarding critical assets, proactively addressing cyber and physical threats, and assessing and mitigating risk accurately and effectively requires comprehensive visibility into both the Deep and the Dark Web.
Adam Meyer's picture
Different intelligence consumers in your organization create and consume varying levels of threat intel to take appropriate actions against identified risks.
Steven Grossman's picture
Without visibility into your information assets, their value, where they live, how they relate to each other and who has access to them, any strategy for protection would be inherently incomplete and ineffective.
Josh Lefkowitz's picture
Digital risk monitoring is a helpful tool for organizations that already have rich intelligence and not just data. Failing to distinguish between the two can be problematic.