Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Several major tech and cybersecurity firms launch the Operational Technology Cyber Security Alliance (OTCSA), which aims to help organizations address OT security challenges. [Read More]
Microsoft this week announced the public preview of a new feature that allows enterprise users to check their Azure Active Directory sign-ins for any unusual activity. [Read More]
Outdated and unsupported operating systems are still present and they still pose a serious risk in many industrial organizations. [Read More]
Chinese telecom company Huawei on Tuesday criticized the Estonian government and media for spreading what it says are “arbitrary and unfounded” allegations about cybersecurity risks related to the company’s mobile phones. [Read More]
Germany released draft security guidelines on Tuesday for next generation wireless networks that stopped short of banning Huawei, as the U.S. warned again it would reconsider intelligence sharing with allies that use the Chinese company’s equipment. [Read More]
Chinese tech giant Huawei said on Wednesday that its revenue for the first nine months of the year grew by almost a quarter despite a US campaign to isolate the company globally. [Read More]
Researchers discovered over 550 fake presidential election-themed domains targeting Republicans, Democrats and their funding websites. [Read More]
Starting with its next stable release, Tor (The Onion Router) browser will reject End-Of-Life relays by default, the Tor Project has announced. [Read More]
A survey of over 1,700 individuals in the utilities sector shows that 56% have reported at least one shutdown or operational data loss, and 54% expect an attack on critical infrastructure in the next year. [Read More]
APT actors have been exploiting recently disclosed vulnerabilities affecting enterprise VPN products from Fortinet, Pulse Secure and Palo Alto Networks, UK’s NCSC warns. [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Jim Gordon's picture
Intel's Jim Gordon presents critical top 10 tactical action items every SMB should take to protect itself.
Gunter Ollmann's picture
Any bug hunter, security analyst, software vendor, or device manufacturer should not rely on CVSS as the pointy end of the stick for prioritizing remediation.
Torsten George's picture
A gradual improvement in cyber hygiene can go a long way toward keeping an organization immune from security infections and minimizing the risk of falling victim to a cyber-attack.
Ashley Arbuckle's picture
The convergence of security products and services is a welcomed development and will lead to improved security.
Ellison Anne Williams's picture
While threats facing private industry and government may once have looked distinctly different, the line separating attackers pursuing these two arenas is now so blurred that it’s often hard to distinguish one from another.
Gunter Ollmann's picture
CISOs should invest time in applying the resources of public cloud to bring automation, scalability, and AI to solving the given problem as a platform for all customers – past, present, and future.
Justin Fier's picture
As innovative attacks continue to expand the purview of cyber security, helping CISOs means equipping them with equally innovative tools that stand a fighting chance.
Josh Lefkowitz's picture
It can be difficult for teams to determine how to obtain and incorporate data from encrypted chat service platforms into their collection strategies in a meaningful way.
Alastair Paterson's picture
While no digital risk framework is perfect, the optimal level of maturity will look to continually identify gaps, update processes and tooling, and reflect organizational changes.
Josh Lefkowitz's picture
The best way for intelligence practitioners to identify what types of context their intelligence consumers truly need is simply to ask them.