Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A study of exposed web-app attack surface reveals that insurance companies are not good at keeping their own security house in order. [Read More]
The Ransomware Readiness Assessment (RRA) module will help organizations assess whether they can defend and recover from a ransomware attack. [Read More]
News analysis: The U.S. government’s push for Software Bill of Materials (SBOMs) has prompted fresh discussions around open source software security, transparency and governance. We look at what’s at stake for cybersecurity buyers and sellers. [Read More]
Firmware security specialsts at Eclypsium have figured out a way to exploit a set of high-severity vulnerabilities that expose millions of Dell computers to stealthy hacker attacks. [Read More]
The NSA has released guidance for securing Unified Communications (UC) and Voice and Video over IP (VVoIP) enterprise communication systems. [Read More]
Google unveils a new end-to-end framework to help drive the enforcement of standards and guidelines to ensuring the integrity of software artifacts throughout the software supply chain. [Read More]
General Manager of the Microsoft Threat Intelligence Center (MSTIC) John Lambert recently keynoted the SecurityWeek threat-intelligence summit where he called for a more collaborative approach to information sharing in cybersecurity. [Read More]
Identity management provider Elisity closes Series A funding to help scale and meet demand for its cloud-delivered cybersecurity platform. [Read More]
CISA has released a fact sheet focusing on the threat posed by ransomware attacks to OT/ICS assets. [Read More]
Recorded Future launches an in-house initiative that sets aside $20 million to invest in seed-stage and Series A startups in the nascent threat-intelligence space. [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

AJ Nash's picture
As you build your cyber intelligence program – and have all the vendors lined up to take your money – don’t overlook the importance of investing in the right people.
Laurence Pitt's picture
Many security teams will have to reduce budget against projects scheduled for 2021, with funds being re-allocated to pandemic-related business and workforce enablement
Tim Bandos's picture
Keeping a ‘six foot distance’ between our digital home life and digital work life can go a long way when it comes to safeguarding our most sensitive data, too.
AJ Nash's picture
Knowing that threat intelligence is readily available and proving its worth is one thing, understanding how to use it within your security operations program is quite another.
Marc Solomon's picture
When intelligence becomes a capability and not just subscriptions to feeds, we can gain the full value of intelligence as the foundation to security operations.
Torsten George's picture
Today’s dynamic threatscape requires security professionals to adjust to an ever-expanding attack surface.
Derek Manky's picture
It’s amazing how foundational security principles, consistently implemented, can help defeat the craftiest attack vector.
John Maddison's picture
By understanding the latest threat trends, security teams can take measures to ensure that their security strategies, including the identification and tracking of new IOCs, are being correctly updated.
Matt Morris's picture
Companies must instill a culture of resilience in which security improvements are emphasized as a fundamental component of an organization’s individual corporate culture
Preston Hogue's picture
From a cybersecurity perspective, perhaps the greatest risk for digital education comes from the wide variation across districts in terms of resources.