Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Australia unveiled the "largest-ever" boost in cybersecurity spending, days after Prime Minister Scott Morrison spoke out about a wave of state-sponsored attacks suspected to have been carried out by China. [Read More]
Many companies view the SOC as a key part of their security strategy, but SOC staff complain about high stress and the lack of proper tools. [Read More]
Hackers are confident that they will outperform AI for the next 10 years when it comes to finding vulnerabilities, Bugcrowd study shows. [Read More]
One of six 'best practices' highlighted by ESI ThoughtLab in a new report on Driving Cybersecurity Performance is simple: "Make more use of cybersecurity insurance to transfer risk." [Read More]
Sen. Ron Wyden has raised concerns about the ability of intelligence agencies to protect secrets and has asked the director of national intelligence about steps taken to improve cybersecurity. [Read More]
Amnesty International warns that contact-tracing technology developed to contain the novel coronavirus threatens users' privacy, highlighting Bahraini, Kuwaiti and Norwegian apps as "among the most dangerous". [Read More]
The US is letting blacklisted Chinese technology giant Huawei back into the fold when it comes to companies working together to set standards for 5G telecom networks. [Read More]
San Francisco, CA-based attack surface management firm RiskIQ has raised $15 million in a Series D funding round led by National Grid Partners (NGP). [Read More]
Zoom says it will not offer end-to-end encryption to free users so that the FBI or local law enforcement can conduct investigations. [Read More]
Britain said Friday it was pushing the United States to form a club of 10 nations that could develop its own 5G technology and reduce dependence on China's controversial telecoms giant Huawei. [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Joshua Goldfarb's picture
Security metrics is a topic that, while challenging, is also important and at the top of the priority list for security organizations. Here are five tips for leveraging security metrics to keep your organization out of the lion’s den.
Craig Harber's picture
As long as organizations continue to employ simplistic “set it and forget it” security approaches, they will be forced into playing reactive, catch-up defense against cyber attackers.
Fred Kneip's picture
Employing a third party adds risk, especially if that company is given some level of access to network and computing resources, or is asked to handle and protect critical or proprietary information.
Marc Solomon's picture
National Cybersecurity Awareness Month (NCSAM) is a great vehicle to raise awareness for cybersecurity and to remind every organization that the ability to improve security operations begins with contextual awareness.
Josh Lefkowitz's picture
Here’s a crash-course on the intelligence cycle and how you can apply and derive value from its core principles—no matter your role or security discipline:
Torsten George's picture
Until government agencies start implementing identity-centric security measures, account compromise attacks will continue to provide a perfect cover for data breaches.
Jim Gordon's picture
Intel's Jim Gordon presents critical top 10 tactical action items every SMB should take to protect itself.
Gunter Ollmann's picture
Any bug hunter, security analyst, software vendor, or device manufacturer should not rely on CVSS as the pointy end of the stick for prioritizing remediation.
Torsten George's picture
A gradual improvement in cyber hygiene can go a long way toward keeping an organization immune from security infections and minimizing the risk of falling victim to a cyber-attack.
Ashley Arbuckle's picture
The convergence of security products and services is a welcomed development and will lead to improved security.