Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

In an attempt to improve the security of its users, the Chrome browser will soon start blocking insecure downloads on HTTPS pages, Google announced. [Read More]
Cyber hygiene and patch management company Automox has raised $30 million in a Series B funding round, which brings the total raised by the company to $42 million. [Read More]
A new Maryland bill would ask the state’s Department of Information Technology to develop a baseline plan for localities within the state to help battle cyber attacks. [Read More]
The United States has welcomed the European Union's new rules on fifth-generation internet but pressed them to go further after the bloc resisted Washington's pressure to ban China's Huawei directly. [Read More]
The U.S. Interior Department has halted the operation of drones over cybersecurity concerns most likely related to the use of Chinese drones. [Read More]
U.S. officials have made advances in trying to prevent similar attacks from undermining the 2020 vote, but the potential threats have increased and some old problems have not been addressed. [Read More]
Britain is expected to announce next week whether to allow China's Huawei to develop its 5G network, an official said on Friday, setting out reasons for agreeing despite US opposition. [Read More]
The United States pressed France on Wednesday to take "strong security measures" against potential breaches from 5G services provided by Chinese telecommunications firm Huawei, saying failure to do so could imperil intelligence exchanges. [Read More]
Cyber insurance provider Coalition has acquired BinaryEdge and it will integrate BinaryEdge technology into its cyber insurance and security platform. [Read More]
The World Economic Forum's Global Risks Report 2020 highlights the irony of the unfolding benefits of the Fourth Industrial Revolution, but brings with it counterbalancing increased cyber risk. [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Laurence Pitt's picture
What can we do in order to prevent the spread of fake content or reduce the risk of a targeted use of Deepfakes that could cause damage to our organization?
Joshua Goldfarb's picture
Gap analysis can serve as a wonderful driver for improving security metrics if the security team understands how to seize the opportunity it presents.
AJ Nash's picture
Once we shed the shackles of “cyber” and “threat,” we free our teams to consider a full spectrum of intelligence, including support to physical security, insider threats, procurement, mergers and acquisitions, and executive decision-making.
Fred Kneip's picture
While some forward-thinking companies have created c-suite positions for IT and security personnel such as CTOs and CISOs, these are, overall, still relatively rare.
Josh Lefkowitz's picture
The successful execution of each step of the intelligence cycle relies on the successful execution of the step that came before it.
Fred Kneip's picture
Third party cyber risk management programs need to go beyond an initial scan and evaluate your third party’s security from the inside out.
Josh Lefkowitz's picture
It’s crucial to recognize that annual security predictions generally only include that which can be feasibly predicted by the final months of the prior year.
Marie Hattar's picture
The solution: every week, devote at least two hours to basic cyber hygiene. Four best practices will help your team build habit from repetition.
Joshua Goldfarb's picture
Security metrics is a topic that, while challenging, is also important and at the top of the priority list for security organizations. Here are five tips for leveraging security metrics to keep your organization out of the lion’s den.
Craig Harber's picture
As long as organizations continue to employ simplistic “set it and forget it” security approaches, they will be forced into playing reactive, catch-up defense against cyber attackers.