Security Experts:

Management & Strategy
long dotted


NVIDIA releases updates for GPU display drivers and other products to address the Spectre and Meltdown vulnerabilities [Read More]
IBM starts releasing firmware updates for its POWER processors to address the recently disclosed Meltdown and Spectre vulnerabilities [Read More]
Rockwell Automation patches high severity vulnerability in MicroLogix 1400 controllers. Flaw allows DoS attacks and possibly remote code execution [Read More]
Microsoft says users with older CPUs will notice a decrease in performance after applying the Spectre and Meltdown updates [Read More]
AMD users no longer receive Windows updates that patch Meltdown and Spectre, and Microsoft warns that some devices may not receive future security updates due to antiviruses [Read More]
Apple updates iOS, macOS and Safari to mitigate the effects of the CPU vulnerabilities behind the Spectre attack. Meltdown mitigated before disclosure [Read More]
Access to money at the right time (and a few other things like the right management team) is essential for cybersecurity firms given the volatility of the market in both emerging start-ups and changing technology. [Read More]
Microsoft’s updates for the Meltdown and Spectre CPU vulnerabilities break Windows on some AMD computers. Patches also cause problems for some apps [Read More]
At least three class action lawsuits have been filed against Intel over the recently disclosed Spectre and Meltdown vulnerabilities [Read More]
Several vulnerabilities found and patched in some Dell EMC data protection products. Some VMware products are also impacted [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Josh Lefkowitz's picture
These tips and best practices will provide insight into some of the key components and processes of a successful usiness Risk Intelligence (BRI) program.
Rafal Los's picture
Without transparency you cannot have trust. And without trust, your business will suffer long-term negative consequences.
Torsten George's picture
We need to consider whether traditional approaches to vulnerability management are still viable and if just upgrading existing methods or tools is sufficient.
Adam Meyer's picture
It’s that time of year again when we look back at the past year and try to anticipate what we can expect in the coming year. Here is my cybersecurity forecast for 2018.
Rafal Los's picture
Are you accountable for projects you have no authority over? If so, is it too late to renegotiate or at least make a note of this with the right level of leadership?
Scott Simkin's picture
A machine learning system needs to be trained, and it cannot be trained without a large amount of previous data and intelligence.
Preston Hogue's picture
Working closely with business groups throughout the process of due diligence fulfills the CISO’s responsibilities and creates a more security-savvy business.
Josh Lefkowitz's picture
It’s crucial to recognize that 2018 will very likely be yet another year of increasingly complex and damaging threats and incidents, which is why we must always build upon and further enhance our intelligence strategies.
Adam Meyer's picture
If your threat intelligence isn’t practical, it’s not really useful. Here are a few examples of practical questions you can ask your threat analyst team.
Travis Greene's picture
The cybersecurity community needs to identify where untapped resources exist in order to move beyond traditional industry practices and contend with this imbalance.