Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The European Commission presented its plan to ensure the secure introduction of 5G telecoms networks, with suspicions hanging over Chinese giant Huawei. [Read More]
Sayata Labs, a company that provides risk assessment solutions for the cyber insurance industry, emerges from stealth mode with $6.5 million in seed funding. [Read More]
Slack launches Enterprise Key Management, an Enterprise Grid add-on feature that gives organizations total control over their encryption keys. [Read More]
Ukraine's security service believes it's prepared to prevent Russia from interfering in its upcoming election. [Read More]
Security concerns about the role of Huawei in Western 5G telecom infrastructure are to be taken seriously, says head of NATO as Washington steps up pressure on Europe not to use the Chinese firm. [Read More]
For a second year in a row, NASA’s cybersecurity program gets failing grade from the Office of Inspector General. [Read More]
Organizations are tackling various aspects of security, such as data, application, identity, infrastructure and response, but are not doing so well in aligning cyber initiatives to executive management's digital transformation priorities. [Read More]
Tripwire launches Penetration Testing Assessment and Industrial Cybersecurity Assessment services to help organizations find vulnerabilities in their systems. [Read More]
Wireshark 3.0.0 has been released and one of the most important changes is that WinPcap has been replaced with the Npcap packet sniffing library. [Read More]
Malicious actors could plant backdoors on bare metal cloud servers and use them to disrupt applications, steal data, and launch ransomware attacks, researchers warn. [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Alastair Paterson's picture
Organizations that continuously monitor their digital footprint and understand their online exposure will be the most effective at mitigating digital risk in the new year.
Lance Cottrell's picture
We spend a lot of time thinking about and trying to mitigate threats that are so extreme you are basically already doomed if they are ever used against you.
Laurence Pitt's picture
Failure to implement basic cybersecurity hygiene practices will leave retailers vulnerable to damage and fines during a lucrative time for their businesses.
Alastair Paterson's picture
As you develop a brand protection program, here are five concrete things you can do now to proactively identify and mitigate risk to your brand.
Josh Lefkowitz's picture
It’s relatively commonplace for CTI and incident response teams to establish a coordinated response plan in preparation for a cyber attack, but—as demonstrated by WannaCry—it’s imperative for physical security teams to be involved in such plans as well.
Mike Fleck's picture
A small business with one running all of IT, cannot defend against cyber-attacks from the North Korean military with the same vigor as Lockheed Martin or Northrup Grumman.
Torsten George's picture
Like the NIST Cybersecurity Framework, it integrates relevant regulations (e.g., HIPAA) and standards (NIST 800-53, ISO 27001, PCI DSS) into a single overarching security framework.
Josh Lefkowitz's picture
There’s no point in having billions of data points if those data points aren’t timely, accurate, actionable, and adequately map to your intelligence objectives and requirements.
Nick Sanna's picture
Board members and senior management are likely to wave off CISO techno-speak and push to get their questions answered on their terms.
Justin Fier's picture
Over time, holding people responsible will lead individuals to see how their actions impact the security of the organization and come to consider themselves responsible for the security of the company.