Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Newly introduced bipartisan legislation aims to implement improved cybersecurity protections for K-12 educational institutions in the United States. [Read More]
Google announces plans to turn off access to G Suite account data for less secure apps (LSAs), as they represent a potential security risk for users. [Read More]
Messaging platform WhatsApp announces plans to take legal action against individuals and companies that abuse the platform for bulk messaging. [Read More]
The U.S. Defense Department wants companies hoping to obtain defense contracts to demonstrate that they can keep sensitive information safe. [Read More]
Microsoft Security Essentials will stop protecting Windows 7 PCs on January 14, 2020, when support for Windows 7 is set to end. [Read More]
Third-party cyber risk management company CyberGRX raises $40 million in a Series D funding round, which brings the total raised by the company to $100 million. [Read More]
For Cyber insurance, precise wording and the correct policy for are important, and it is also important that the policy accurately reflects the insured’s security posture. [Read More]
Automated third-party security lifecycle management provider Panorays this week announced it raised $15 million as part of a Series A funding round. [Read More]
Chinese tech giant Huawei is asking a U.S. federal court to throw out a rule that bars rural phone carriers from using government money to purchase its equipment on security grounds. [Read More]
A group of Democratic U.S. senators is questioning Amazon about the security of its Ring doorbell cameras following reports that some Ukraine-based employees had access to video footage from customers’ homes. [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Josh Lefkowitz's picture
Here’s a crash-course on the intelligence cycle and how you can apply and derive value from its core principles—no matter your role or security discipline:
Torsten George's picture
Until government agencies start implementing identity-centric security measures, account compromise attacks will continue to provide a perfect cover for data breaches.
Jim Gordon's picture
Intel's Jim Gordon presents critical top 10 tactical action items every SMB should take to protect itself.
Gunter Ollmann's picture
Any bug hunter, security analyst, software vendor, or device manufacturer should not rely on CVSS as the pointy end of the stick for prioritizing remediation.
Torsten George's picture
A gradual improvement in cyber hygiene can go a long way toward keeping an organization immune from security infections and minimizing the risk of falling victim to a cyber-attack.
Ashley Arbuckle's picture
The convergence of security products and services is a welcomed development and will lead to improved security.
Ellison Anne Williams's picture
While threats facing private industry and government may once have looked distinctly different, the line separating attackers pursuing these two arenas is now so blurred that it’s often hard to distinguish one from another.
Gunter Ollmann's picture
CISOs should invest time in applying the resources of public cloud to bring automation, scalability, and AI to solving the given problem as a platform for all customers – past, present, and future.
Justin Fier's picture
As innovative attacks continue to expand the purview of cyber security, helping CISOs means equipping them with equally innovative tools that stand a fighting chance.
Josh Lefkowitz's picture
It can be difficult for teams to determine how to obtain and incorporate data from encrypted chat service platforms into their collection strategies in a meaningful way.