Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Cyber insurance firm At-Bay has raised $13 million in Series A funding, which brings the company’s total funding to $19 million. [Read More]
SafeBreach raises $15 million in Series B funding round, bringing the total raised by the company so far to $34 million [Read More]
Industrial cybersecurity firm Indegy announces new risk assessment service for operational technology (OT) environments [Read More]
Study conducted by Positive Technologies shows that industrial networks are often easy to hack from corporate systems [Read More]
Slack releases goSDL, an open source secure development lifecycle (SDL) tool designed to provide developers a tailored security checklist for their projects [Read More]
Join us for this live webinar, as security experts from Rapid7 walk through the need for and what it takes to implement and run a cybersecurity training and education program. [Read More]
A researcher has developed a tool that helps Mac laptop users detect evil maid attacks by monitoring the state of the device’s lid [Read More]
Drupal will release a follow-up patch for Drupalgeddon2 on April 25. Attackers continue to exploit the vulnerability to deliver various types of malware [Read More]
FDA reveals its plans for medical device cybersecurity, including requiring update and patch capabilities built into devices, updated guidance for protecting against risks, and policies and procedures for vulnerability disclosures [Read More]
AlienVault launches OTX Endpoint Threat Hunter, a free scanning service that allows organizations to identify threats and assess risk [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Alastair Paterson's picture
Security teams need visibility outside the organization and across the widest range of data sources possible to mitigate digital risk and better protect the organization.
John Maddison's picture
Digital transformation and the accelerated evolution of cybercrime are the biggest challenges that IT security teams have ever had to face.
Steven Grossman's picture
Identifying those kinds of repeated non-malicious behaviors amongst a group of peers can help identify broken business processes that are requiring employees to violate policy in order to do their job.
Josh Lefkowitz's picture
With so many intelligence offerings, it’s important for prospective consumers to have a sense of what intelligence—if any—a vendor actually provides.
Justin Fier's picture
The insider threat is under-scrutinized by the security community, leaving networks vulnerable to compromise by their own employees, especially those with privileged access.
Josh Lefkowitz's picture
Real-time intelligence is exceedingly difficult to attain. Many current offerings are limited in how they can address the broad spectrum of threats and adversaries that exist today.
Steven Grossman's picture
How can a company protect its information and operations without running askew of data privacy laws and the concerns of its customers?
Preston Hogue's picture
No company has the ability to mitigate all risks at all times. No company I’ve ever visited has even had all of its identified risks treated at any given point.
Alastair Paterson's picture
Like a coach, you need to be able to see the big picture with an approach that monitors the entire Internet for risks to your business.
Torsten George's picture
By supplementing traditional perimeter defense mechanisms with data integrity, identity management, and risk-based prioritization principals, organizations can significantly reduce their exposure