Security Experts:

long dotted


U.S. SEC releases updated guidance on data breach disclosures and advises companies to adopt policies that ban executives from trading during security incident investigations [Read More]
Artificial intelligence could be deployed by dictators, criminals and terrorists to manipulate elections and use drones in terrorist attacks, experts say. [Read More]
U.S. Department of Justice creates new cybersecurity task force to help find ways to combat cyber threats and become more efficient in this area [Read More]
BitSight has published an analysis of the security posture of the federal supply chain, which shows a significant gap between the security performance of U.S. federal agencies and their contractors. [Read More]
U.S. Department of Energy announces new Office of Cybersecurity, Energy Security, and Emergency Response (CESER) [Read More]
Dispel launches platform designed to help secure elections, including voter, ballot and campaign information [Read More]
Security experts earned more than $100,000 for over 100 vulnerabilities reported as part of the Hack the Air Force 2.0 bug bounty challenge [Read More]
Kaspersky files new lawsuit over the U.S. government’s software ban, this time challenging the National Defense Authorization Act (NDAA) [Read More]
Pepperl+Fuchs HMIs are vulnerable to Meltdown and Spectre attacks, but exploitation should not be easy if organizations follow security best practices [Read More]
Schneider Electric patches vulnerabilities in IGSS automation system, including in SCADA software and mobile applications [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Torsten George's picture
By supplementing traditional perimeter defense mechanisms with data integrity, identity management, and risk-based prioritization principals, organizations can significantly reduce their exposure
Alastair Paterson's picture
Remember that cybercriminals will shift targets and evolve their tactics, techniques and procedures (TTPs) throughout the year.
Steven Grossman's picture
President Ronald Reagan taught us to “trust but verify,” meaning trust is great, but blind trust is dangerous.
Josh Lefkowitz's picture
These tips and best practices will provide insight into some of the key components and processes of a successful usiness Risk Intelligence (BRI) program.
Torsten George's picture
We need to consider whether traditional approaches to vulnerability management are still viable and if just upgrading existing methods or tools is sufficient.
Adam Meyer's picture
It’s that time of year again when we look back at the past year and try to anticipate what we can expect in the coming year. Here is my cybersecurity forecast for 2018.
Preston Hogue's picture
Working closely with business groups throughout the process of due diligence fulfills the CISO’s responsibilities and creates a more security-savvy business.
Josh Lefkowitz's picture
It’s crucial to recognize that 2018 will very likely be yet another year of increasingly complex and damaging threats and incidents, which is why we must always build upon and further enhance our intelligence strategies.
Oliver Rochford's picture
Compared to the perception that security inhibits productivity and innovation, the reality is bad security has a far greater negative impact.
Josh Lefkowitz's picture
When key decision-makers broaden their mindsets and strategies pertaining to the value and function of intelligence, their organizations can become better positioned to mitigate the cyber and physical risks they face.