Security Experts:

long dotted


Adobe ships patches for 29 security vulnerabilities haunting users of its Connect and Magento software products. [Read More]
Organizations have been warned that a misconfiguration related to Salesforce Communities can lead to the exposure of sensitive data. [Read More]
Roughly 30,000 — possibly many more — internet-exposed Microsoft Exchange servers are vulnerable to ProxyShell attacks. [Read More]
Reversing Labs closes a $56 million Series B round of financing to build out enterprise software supply chain security products. [Read More]
An analysis of public ICS exploits can help defenders determine which vulnerabilities should be prioritized for remediation or mitigation. [Read More]
The United States’ 1.2 trillion “Infrastructure Investment and Jobs Act” allocates roughly $2 billion to cybersecurity. [Read More]
Corellium COO Matt Tait warns that stolen zero-days are changing the economics of mass exploitation and calls for platform vendors to make major changes to address the surge in supply chain attacks. [Read More]
Cybersecurity audits at eight U.S. government agencies show that they made little progress over the past two years. [Read More]
The new document provides recommendations on minimizing risks associated with malicious targeting of Kubernetes clusters. [Read More]
The SAP Security Survey Report 2021 shows that many SAP customers have a false sense of security. [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Derek Manky's picture
It’s amazing how foundational security principles, consistently implemented, can help defeat the craftiest attack vector.
John Maddison's picture
By understanding the latest threat trends, security teams can take measures to ensure that their security strategies, including the identification and tracking of new IOCs, are being correctly updated.
Matt Morris's picture
Companies must instill a culture of resilience in which security improvements are emphasized as a fundamental component of an organization’s individual corporate culture
Preston Hogue's picture
From a cybersecurity perspective, perhaps the greatest risk for digital education comes from the wide variation across districts in terms of resources.
Alastair Paterson's picture
Opportunities for accidental exposure of sensitive information are often compounded by multiple stakeholders using collaborative tools without the proper policies, oversight and security training.
AJ Nash's picture
Intelligence is one of a few vital security concepts that industries are increasing their investments in as they recognize the documented value of proactive security.
Marc Solomon's picture
Phil Jones who, who has overseen Operations within Airbus Cybersecurity since 2016, discusses some of the key takeaways from the current crisis.
Joshua Goldfarb's picture
Some security start-ups bring much needed creative thinking and new ideas to a challenging field. Others don’t bring much of anything to the table, and in some cases, can actually harm an organization’s security posture.
Gunter Ollmann's picture
As SecOps teams increasingly take on proactive risk reduction, their vocabulary expands from security threats to include posture lapses, and posture fatigue will grow.
Idan Aharoni's picture
The threat intelligence space is filled with great vendors who can provide organizations with a lot of value in helping them protect their brand, employees and customers.