Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The United States has welcomed the European Union's new rules on fifth-generation internet but pressed them to go further after the bloc resisted Washington's pressure to ban China's Huawei directly. [Read More]
The U.S. Interior Department has halted the operation of drones over cybersecurity concerns most likely related to the use of Chinese drones. [Read More]
U.S. officials have made advances in trying to prevent similar attacks from undermining the 2020 vote, but the potential threats have increased and some old problems have not been addressed. [Read More]
Britain is expected to announce next week whether to allow China's Huawei to develop its 5G network, an official said on Friday, setting out reasons for agreeing despite US opposition. [Read More]
The United States pressed France on Wednesday to take "strong security measures" against potential breaches from 5G services provided by Chinese telecommunications firm Huawei, saying failure to do so could imperil intelligence exchanges. [Read More]
Cyber insurance provider Coalition has acquired BinaryEdge and it will integrate BinaryEdge technology into its cyber insurance and security platform. [Read More]
The World Economic Forum's Global Risks Report 2020 highlights the irony of the unfolding benefits of the Fourth Industrial Revolution, but brings with it counterbalancing increased cyber risk. [Read More]
NIST has announced version 1.0 of its Privacy Framework, a tool designed to help organizations manage privacy risks. [Read More]
Industry professionals comment on the Windows crypto vulnerability patched this week by Microsoft and the NSA’s decision to disclose the flaw. [Read More]
Siemens has addressed several vulnerabilities this week and warned organizations about the security risks associated with the use of ActiveX in industrial products. [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Fred Kneip's picture
Employing a third party adds risk, especially if that company is given some level of access to network and computing resources, or is asked to handle and protect critical or proprietary information.
Marc Solomon's picture
National Cybersecurity Awareness Month (NCSAM) is a great vehicle to raise awareness for cybersecurity and to remind every organization that the ability to improve security operations begins with contextual awareness.
Josh Lefkowitz's picture
Here’s a crash-course on the intelligence cycle and how you can apply and derive value from its core principles—no matter your role or security discipline:
Torsten George's picture
Until government agencies start implementing identity-centric security measures, account compromise attacks will continue to provide a perfect cover for data breaches.
Jim Gordon's picture
Intel's Jim Gordon presents critical top 10 tactical action items every SMB should take to protect itself.
Gunter Ollmann's picture
Any bug hunter, security analyst, software vendor, or device manufacturer should not rely on CVSS as the pointy end of the stick for prioritizing remediation.
Torsten George's picture
A gradual improvement in cyber hygiene can go a long way toward keeping an organization immune from security infections and minimizing the risk of falling victim to a cyber-attack.
Ashley Arbuckle's picture
The convergence of security products and services is a welcomed development and will lead to improved security.
Ellison Anne Williams's picture
While threats facing private industry and government may once have looked distinctly different, the line separating attackers pursuing these two arenas is now so blurred that it’s often hard to distinguish one from another.
Gunter Ollmann's picture
CISOs should invest time in applying the resources of public cloud to bring automation, scalability, and AI to solving the given problem as a platform for all customers – past, present, and future.