Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

India-based security services and products firm Network Intelligence Inc (NII) has raised Rs 33-crore funding (approximately $4.8 million) from private equity firm Helix Investments. [Read More]
Facebook claims it removes 99% of content posted by terrorist organizations without the need for users to report it. 1.9 million pieces of this type of content removed in Q1 2018 [Read More]
Intel Core processors affected by LazyFP vulnerability similar to Meltdown. Patches being developed, but many systems already not impacted [Read More]
Kaspersky suspends its collaboration with Europol and the NoMoreRansom initiative after the EU voted a resolution that describes the company’s software as “malicious” [Read More]
UK retailer Dixons Carphone investigating hacker attack impacting millions of customers, including their payment card data [Read More]
Google this week detailed plans to completely remove the inline installation of Chrome extensions from its web browser by the end of the year [Read More]
Australia will help fund and build an underseas communications cable to the Solomon Islands after the Pacific nation was convinced to drop a contract with Chinese company Huawei over security concerns [Read More]
Updates released by Microsoft for Windows enable a feature that should prevent attacks involving the recently disclosed Variant 4 of the Spectre/Meltdown flaws [Read More]
Vietnamese lawmakers on Tuesday approved a sweeping cyber security law which could compel Facebook and Google to take down critical posts within 24 hours, as space for debate is crushed inside the Communist country. [Read More]
Bitcoin declines 5% after hackers reportedly steal over $37 million worth of cryptocurrency from South Korean exchange Coinrail [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Marc Solomon's picture
Automating threat intelligence prioritization also allows you to proactively deploy the right intelligence to the right tools with greater speed and confidence.
Ashley Arbuckle's picture
Managed security services are now evolving to managed detection and response (MDR) services that include security monitoring, advanced threat detection, and incident readiness and response.
Josh Lefkowitz's picture
With so many intelligence teams blinded by vast amounts of data and an overwhelmingly complex threat landscape, establishing the right intelligence requirements (IRs) can be challenging.
Justin Fier's picture
With many companies’ security tools numbering into the dozens, it is hardly surprising that all too often security teams suffer from alert fatigue and burnout – while genuine threats slip through the cracks.
Marc Solomon's picture
In a virtual cybersecurity situation room, team members can collaborate on investigations to detect threats faster, accelerate response and even anticipate what the future may hold.
Joshua Goldfarb's picture
There are quite a few ways in which enterprises can look to properly evaluate various Vendor Risk Management (VRM) offerings and differentiate between them.
Joshua Goldfarb's picture
We can all be more understanding of people when they do exactly what we incentivize them to do. To that point, I offer “10 security behaviors that anger us, but that we incentivize".
Marc Solomon's picture
It is important for threat intelligence analysts, SOCs and incident responders to work together to take the right actions faster, reducing the time to response and remediation.
Ashley Arbuckle's picture
We have an opportunity to expand the pool of workers and improve security and financial performance in the process, with teams that are based on inclusion and diversity.
Bradon Rogers's picture
While a contract, distributed, partner-oriented workforce and supply chain can create serious risks to your organization, careful implementation of visibility and data protection strategies can help you mitigate many of the risks.