Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The DHS’s Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert for the Windows vulnerability tracked as BlueKeep and CVE-2019-0708 after successfully exploiting it for remote code execution. [Read More]
Some U.S. government agencies still rely on knowledge-based identity verification despite the fact that the OPM and Equifax breaches have made this system insecure. [Read More]
Rapid7 has analyzed the visible cyber exposure of some of the UK's largest companies -- the FTSE 250. [Read More]
Organizations have been investing more in ICS cyber security and the results are showing, but many still rate their overall risk profile as severe or high, according to the SANS 2019 State of OT/ICS Cybersecurity Report. [Read More]
Huawei's cyber security chief told the UK parliament Monday that the Chinese telecoms giant has been advised it was under no obligation to spy for Beijing if so asked by the Communist state. [Read More]
Due to the high risk of exploitation and a very high number of devices that are still vulnerable, the NSA has urged Windows users to immediately address the vulnerability tracked as BlueKeep and CVE-2019-0708. [Read More]
Hackers can use synthetic clicks to bypass many of the privacy and security features implemented by Apple in macOS. The vulnerability is currently unpatched. [Read More]
Microsoft has reminded users to patch the wormable Windows vulnerability tracked as BlueKeep and CVE-2019-0708 due to the high risk of exploitation. [Read More]
AttackIQ, a company that specializes in continuous security validation, raised $17.6 million in a Series B funding round, which brings the total raised by the firm to roughly $35 million. [Read More]
Chinese telecom giant Huawei stepped up its legal battle on Wednesday to overturn US legislation barring American federal agencies from buying its products amid an escalating high-tech dispute. [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Ashley Arbuckle's picture
The convergence of security products and services is a welcomed development and will lead to improved security.
Ellison Anne Williams's picture
While threats facing private industry and government may once have looked distinctly different, the line separating attackers pursuing these two arenas is now so blurred that it’s often hard to distinguish one from another.
Gunter Ollmann's picture
CISOs should invest time in applying the resources of public cloud to bring automation, scalability, and AI to solving the given problem as a platform for all customers – past, present, and future.
Justin Fier's picture
As innovative attacks continue to expand the purview of cyber security, helping CISOs means equipping them with equally innovative tools that stand a fighting chance.
Josh Lefkowitz's picture
It can be difficult for teams to determine how to obtain and incorporate data from encrypted chat service platforms into their collection strategies in a meaningful way.
Alastair Paterson's picture
While no digital risk framework is perfect, the optimal level of maturity will look to continually identify gaps, update processes and tooling, and reflect organizational changes.
Josh Lefkowitz's picture
The best way for intelligence practitioners to identify what types of context their intelligence consumers truly need is simply to ask them.
Alastair Paterson's picture
By understanding where assets are exposed, their value to attackers, and how attackers target this data, organizations can make better decisions about their defenses and improve them over time.
Josh Lefkowitz's picture
Josh Lefkowitz shares—and debunks—some of the most persistent and misleading BRI fallacies he has heard over the years.
Alastair Paterson's picture
Organizations’ perimeters will continue to erode as their digital footprints expand, but with the right risk protection strategy any organization can succeed in the age of digital transformation.