Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The DHS’s Cybersecurity and Infrastructure Security Agency (CISA) has published details on its strategy for the secure deployment of 5G networks within the country. [Read More]
Video app TikTok said Saturday it will challenge in court a Trump administration crackdown on the popular Chinese-owned platform, which Washington accuses of being a national security threat. [Read More]
A top US official for election security said his biggest worry is the possibility of outside interference in a likely slow count of the votes the day after the November 3 presidential contest. [Read More]
TikTok has stepped up its defense against US accusations that the popular video app is a national security threat, denouncing what it called "rumors and misinformation" about its links to the Chinese government. [Read More]
Industrial cybersecurity firm Radiflow launches CIARA, an automated risk analysis platform for industrial systems. [Read More]
A coordinated effort by Facebook, Google and other online platforms to curb the spread of disinformation and thwart efforts to manipulate voters. [Read More]
A previously misfiring smartphone app to help track transmission of the coronavirus will be trialled again in parts of England following two months of troubleshooting. [Read More]
A ban by President Donald Trump's administration on Chinese mobile apps such as TikTok and WeChat risks fragmenting an already fragile global internet and creating an American version of China's "Great Firewall." [Read More]
The US bans on Chinese apps TikTok and WeChat are not particularly valuable for US security, but could step up broader commercial pressure on Beijing and help President Donald Trump appear tough as he seeks reelection. [Read More]
The United States has fired a new salvo in its rivalry with China, ordering sweeping restrictions against Chinese-owned social media stars TikTok and WeChat. [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Joshua Goldfarb's picture
Gap analysis can serve as a wonderful driver for improving security metrics if the security team understands how to seize the opportunity it presents.
AJ Nash's picture
Once we shed the shackles of “cyber” and “threat,” we free our teams to consider a full spectrum of intelligence, including support to physical security, insider threats, procurement, mergers and acquisitions, and executive decision-making.
Fred Kneip's picture
While some forward-thinking companies have created c-suite positions for IT and security personnel such as CTOs and CISOs, these are, overall, still relatively rare.
Josh Lefkowitz's picture
The successful execution of each step of the intelligence cycle relies on the successful execution of the step that came before it.
Fred Kneip's picture
Third party cyber risk management programs need to go beyond an initial scan and evaluate your third party’s security from the inside out.
Josh Lefkowitz's picture
It’s crucial to recognize that annual security predictions generally only include that which can be feasibly predicted by the final months of the prior year.
Marie Hattar's picture
The solution: every week, devote at least two hours to basic cyber hygiene. Four best practices will help your team build habit from repetition.
Joshua Goldfarb's picture
Security metrics is a topic that, while challenging, is also important and at the top of the priority list for security organizations. Here are five tips for leveraging security metrics to keep your organization out of the lion’s den.
Craig Harber's picture
As long as organizations continue to employ simplistic “set it and forget it” security approaches, they will be forced into playing reactive, catch-up defense against cyber attackers.
Fred Kneip's picture
Employing a third party adds risk, especially if that company is given some level of access to network and computing resources, or is asked to handle and protect critical or proprietary information.