Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A new report from the United States Government Accountability Office (GAO) shows that the Department of Energy (DOE) has yet to fully analyze the electric grid cybersecurity risks. [Read More]
A survey of 3,000 CISOs in Europe shows that while many feel burned out and have considered leaving the industry, a vast majority are 'thrilled' by their work and fully immersed. [Read More]
Apple will soon patch a bug in iOS 13 and iPadOS that gives “full access” permissions to third-party keyboard apps without the user’s approval. [Read More]
Honeywell introduces the Forge Cybersecurity Platform, a solution designed to help industrial organizations protect OT and IIoT assets. [Read More]
Critical infrastructure and other organizations are increasingly at risk of being targeted in attacks involving RDP and disruptive ransomware. [Read More]
Cycode, a company that specializes in protecting source code, has emerged from stealth mode with $4.6 million in seed funding. [Read More]
California-based cyber insurance firm Cowbell Cyber has emerged from stealth, announcing its Cowbell Factor product with $3.3 million seed funding. [Read More]
As Americans prepare for 2020 elections, digital threats to election security are multiplying, stoking fears of a tainted outcome. [Read More]
An analysis of Android flashlight apps available in Google Play reveals that they request an average of 25 permissions, with some requesting up to 77 permissions when installed. [Read More]
Researchers disclose NetCAT, a new side-channel attack method that can be exploited to steal sensitive data from remote servers powered by Intel CPUs with DDIO technology. [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Justin Fier's picture
As innovative attacks continue to expand the purview of cyber security, helping CISOs means equipping them with equally innovative tools that stand a fighting chance.
Josh Lefkowitz's picture
It can be difficult for teams to determine how to obtain and incorporate data from encrypted chat service platforms into their collection strategies in a meaningful way.
Alastair Paterson's picture
While no digital risk framework is perfect, the optimal level of maturity will look to continually identify gaps, update processes and tooling, and reflect organizational changes.
Josh Lefkowitz's picture
The best way for intelligence practitioners to identify what types of context their intelligence consumers truly need is simply to ask them.
Alastair Paterson's picture
By understanding where assets are exposed, their value to attackers, and how attackers target this data, organizations can make better decisions about their defenses and improve them over time.
Josh Lefkowitz's picture
Josh Lefkowitz shares—and debunks—some of the most persistent and misleading BRI fallacies he has heard over the years.
Alastair Paterson's picture
Organizations’ perimeters will continue to erode as their digital footprints expand, but with the right risk protection strategy any organization can succeed in the age of digital transformation.
Grady Summers's picture
Companies in China are facing many of the same threats that your organization faces today, but they are addressing these threats at a massive scale, on emerging platforms, and with innovative approaches that we can learn from.
Marc Solomon's picture
The ability to customize threat intelligence scores allows you to prioritize threats to your organization and reevaluate and reprioritize as new data and context becomes available.
Joshua Goldfarb's picture
In some instances, it is precisely because we are so familiar and comfortable with something that makes us incapable of seeing that there is a better way.