Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

ESET has partnered with Myers-Briggs to examine the relationship between staff personality traits (their MBTI) and cyber behaviors. [Read More]
Researchers have catalogued most known Windows process injection techniques and discovered a new one, which they say is stealthy and can bypass all Microsoft protections. [Read More]
The United States unveiled rules on formally banning technology giant Huawei and other Chinese firms from government contracts in the latest move in the countries' escalating trade war. [Read More]
Critical vulnerabilities in enterprise VPNs from Palo Alto Networks, Fortinet and Pulse Secure allow attackers to infiltrate corporate networks, obtain sensitive information, and eavesdrop on communications. [Read More]
U.S. Attorney General Bill Barr says increased encryption of data on phones and computers and encrypted messaging apps are putting American security at risk. [Read More]
Chief executives from several US tech companies expressed "strong support" for Donald Trump's policies restricting the use of products from Chinese telecom giant Huawei. [Read More]
A former National Security Agency contractor awaits sentencing in Baltimore’s federal court for storing two decades’ worth of classified documents at his Maryland home. [Read More]
Poland and Lithuania are looking into the potential security risks of using a Russian-made face-editing app that has triggered a viral social media trend where users post "aged" selfies. [Read More]
Users and organizations continue to patch the Windows vulnerability tracked as BlueKeep and CVE-2019-0708, but over 800,000 systems are still exposed to attacks. [Read More]
Russian-made FaceApp, which allows users to see how they will look as they age, found itself in the eye of a political storm in the US Wednesday, with one senator urging an FBI investigation into its "national security and privacy risks". [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Alastair Paterson's picture
By understanding where assets are exposed, their value to attackers, and how attackers target this data, organizations can make better decisions about their defenses and improve them over time.
Josh Lefkowitz's picture
Josh Lefkowitz shares—and debunks—some of the most persistent and misleading BRI fallacies he has heard over the years.
Alastair Paterson's picture
Organizations’ perimeters will continue to erode as their digital footprints expand, but with the right risk protection strategy any organization can succeed in the age of digital transformation.
Grady Summers's picture
Companies in China are facing many of the same threats that your organization faces today, but they are addressing these threats at a massive scale, on emerging platforms, and with innovative approaches that we can learn from.
Marc Solomon's picture
The ability to customize threat intelligence scores allows you to prioritize threats to your organization and reevaluate and reprioritize as new data and context becomes available.
Joshua Goldfarb's picture
In some instances, it is precisely because we are so familiar and comfortable with something that makes us incapable of seeing that there is a better way.
Josh Lefkowitz's picture
A business risk intelligence (BRI) program needs to understand and account for the different categories of risk faced by all business functions across an enterprise.
Alastair Paterson's picture
Organizations that continuously monitor their digital footprint and understand their online exposure will be the most effective at mitigating digital risk in the new year.
Lance Cottrell's picture
We spend a lot of time thinking about and trying to mitigate threats that are so extreme you are basically already doomed if they are ever used against you.
Laurence Pitt's picture
Failure to implement basic cybersecurity hygiene practices will leave retailers vulnerable to damage and fines during a lucrative time for their businesses.