Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Offensive security platform provider Hadrian receives €10.5 million ($11 million) unsolicited funding that will drive scale. [Read More]
The ICS vendors whose products are affected by the OT:Icefall vulnerabilities have started releasing advisories. [Read More]
Aqua Security releases open source tool for auditing the software supply chain to ensure compliance with newly created CIS guidelines. [Read More]
Cyberint, a threat intelligence startup competing in the attack surface management category, has raised $40 million in financing led by StageOne Late Stage Arm. [Read More]
SYN Ventures is leading a $23 million Series A investment in RevealSecurity, a startup building technology to thwart malicious insider threats. [Read More]
Adobe warned of “critical” code execution flaws that expose both Windows and macOS users to malicious hacker attacks. [Read More]
Backup-as-a-service firm HYCU has raised $53 million in a Series B funding round led by Acrew Capital. [Read More]
In partnership with Coalition to Reduce Cyber Risk (CR2), 37 organizations in eight countries have signed a pledge to improve cyber resilience against ransomware and other threats. [Read More]
SecurityWeek is publishing a daily digest summarizing some of the announcements made by vendors at the RSA Conference 2022. [Read More]
CISA has provided clarifications on the criteria for adding vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Jeff Orloff's picture
The Defense Readiness Index is a reliable alternative for assessing a security team’s skill level, developing a roadmap for improving cyber competencies, and reaching the optimal level of cyber security readiness.
Gordon Lawson's picture
The surge of cyber attacks in 2021 was a wake-up call for consumers, who felt the firsthand effects that can result from a breach.
Torsten George's picture
Organizations need to look beyond preventive measures when it comes to dealing with today’s ransomware threats and invest in ransomware response, which improves their ability to prepare and quickly recover endpoints from ransomware attacks.
Landon Winkelvoss's picture
Many think open source intelligence is just another name for better googling. They are wrong. Good open source and threat intelligence are derived from three core capabilities.
Keith Ibarguen's picture
Vendor agnostic technology, married with actionable, globally-sourced, and continually evolving intelligence, augmented by humans, is needed to defend our enterprises.
Laurence Pitt's picture
There are areas where governments can learn from the private sector and vice-versa, which will help both sides adapt more quickly and effectively to a continuously evolving threat environment.
Torsten George's picture
Schools should take measures to identify and secure sensitive data, keep devices up-to-date, and ensure that their endpoint security controls are working.
Gordon Lawson's picture
The rise of social engineering tactics as well as risks associated with embedded vulnerabilities in contractor networks makes keeping this technology confidential and out of the hands of adversaries increasingly difficult.
Torsten George's picture
Cyber resiliency measures (i.e., architectural design, technologies, operational practices) assume that today’s threat actors can achieve a foothold in an organization’s infrastructure and in turn post-exploit activities must be contained and eliminated.
Landon Winkelvoss's picture
The security industry must commit to a risk-based approach that understands the specific attacks and actors targeting their industry and profile.