Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Threat Intelligence and research firm Flashpoint has raised $10 million in Series B funding, and expanded into the Business Risk Intelligence (BRI) market. [Read More]
Cybersecurity executives could lose their jobs if they fail to provide useful, actionable information, a recent survey reveals. [Read More]
The sixth annual survey from Smarsh on financial services communications compliance issues shows that regulatory scrutiny and compliance difficulties are increasing while resources and solutions are not. [Read More]
New report offers advice on each of the SANS critical security controls aimed specifically at providing security for SAP implementations. [Read More]
SWIFT CEO Gottfried Leibbrandt revealed a five-point plan designed to harden SWIFT transactions following the $81 million theft via the Bangladesh central bank. [Read More]
Onapsis warns that there are indicators of exploitation against 36 large-scale global enterprises around the world. [Read More]
Verizon has published its widely anticipated 2016 Data Breach Investigations Report (DBIR), compiled by Verizon with the support 67 contributing partners. [Read More]
FireEye has launched a new service designed to help organizations manage the risks associated with corporate Mergers & Acquisitions (M&A). [Read More]
In a recent survey, only 31 percent of respondents believe their vendor’s risk management program is highly effective, yet only 38 percent track the effectiveness of the vendor risk management program. [Read More]
Since no company can be secure against targeted attacks, there can be no surprise that law firms will be breached once they are targeted. [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Torsten George's picture
Faced with hundreds, thousands, and even hundreds of thousands of vulnerabilities across their IT infrastructures leaves security practitioners at a virtually insurmountable disadvantage.
Travis Greene's picture
Unlike the political arena, or even other divisions of the technology industry, when working in IT security, people rarely notice when everything is done perfectly.
Josh Lefkowitz's picture
The pivotal role of cybersecurity during the recent United States presidential election has underscored the critical need to focus on a secure electoral process.
Eddie Garcia's picture
To reduce the chances of falling victim to an insider-driven breach, security and risk professionals should start by learning what their available data can tell them.
Joshua Goldfarb's picture
No one ever said that prioritizing risk, meeting the needs of a complex market, or starting a technology company were easy. But more often than not, the answers we seek are right there in front of us.
Torsten George's picture
Implementing a Zero Trust model represents a dramatic change and requires a well-planned transition that should be complimented by efforts to operationalize cyber risk detection, prevention, and response.
Alastair Paterson's picture
Sophisticated adversaries are finding vulnerabilities wherever they can, and often that means looking to an organization’s partners for weaknesses in defenses.
Torsten George's picture
By implementing these three main pillars, organizations can operationalize their cyber security practices to shorten time-to-detection and ultimately, time-to-remediation of cyber threats.
Adam Meyer's picture
With any cyber security-related capability, you need to answer the “so what” question. What does any of this intelligence mean? And does it help us achieve the desired outcome(s)?
Torsten George's picture
Relying solely on existing intelligence provided by vulnerability scanners should only be a first step in a cyber risk management process.