Security Experts:

long dotted


British officials downplayed reports that Prime Minister Theresa May will allow China’s Huawei to supply parts of the U.K.’s new internet network, a decision that goes against U.S. pleas to ban the firm as it could help Beijing’s spying efforts. [Read More]
A cybersecurity research company has uncovered over 30 security issues affecting Java Card technology, but Oracle and Gemalto have downplayed the impact of these flaws. [Read More]
A top White House official told Kirstjen Nielsen, then Homeland Security secretary, not to bring up election security with President Donald Trump, steering her away from discussing a critical national security threat with a president who bristles at suggestions that Russian interference contributed to his 2016 victory. [Read More]
British Prime Minister Theresa May has reportedly approved a limited role for China's Huawei to help build a 5G network in the UK, shrugging off security warnings from senior ministers and Washington surrounding the telecoms giant. [Read More]
The European Commission has no evidence of issues associated with using Kaspersky Lab’s products, a document published this week reveals. [Read More]
FireEye releases an open source tool designed to automate the analysis of Adobe Flash files to identify malware and prevent infections. [Read More]
An analysis of the reservation systems used by 1,500 hotels revealed that over two-thirds expose user information and allow attackers to cancel bookings. [Read More]
New details emerge about the malware stored on the USB drive carried by the Chinese woman arrested at President Donald Trump’s Mar-a-Lago club. [Read More]
Cyber risk management company RiskLens raises $20 million in Series B funding round, which brings the total raised by the firm to over $27 million. [Read More]
The UK government has published its fourth annual breaches survey: the Cyber Security Breaches Survey 2019. [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Nick Sanna's picture
Board members and senior management are likely to wave off CISO techno-speak and push to get their questions answered on their terms.
Justin Fier's picture
Over time, holding people responsible will lead individuals to see how their actions impact the security of the organization and come to consider themselves responsible for the security of the company.
Josh Lefkowitz's picture
It is important to understand how the right intelligence can support network defense teams, fraud, physical security, M&A, insider threat, supply chain, and brand reputation teams, among others.
Alastair Paterson's picture
Although the challenge may seem insurmountable, there’s a lot that security professionals can do to mitigate insider risk.
Nick Sanna's picture
Cyber risk has risen to the level of enterprise risk – which they expect to be measured, managed, and reported in the terms that the rest of the enterprise understands.
Marie Hattar's picture
Cybersecurity teams need to adopt an adversarial mindset and understand what their enemies are capable of and prepare an appropriate response.
Torsten George's picture
Solving the security challenges healthcare providers face will fuel faster growth, enable further digital transformation, and ultimately result in enhanced patient care and data protection.
Preston Hogue's picture
Security teams should think about how company data might connect with data from other organizations or industries and how those combined data sets could be triangulated into a larger picture that ultimately puts you at risk.
Siggi Stefnisson's picture
Companies often grant access to corporate data and give access to all sorts of systems with the expectation that their business partners will have reasonable security practices in place.
Stan Engelbrecht's picture
If you know you want to improve your security operations, but don’t know where to start, here are a few steps that can help get you ready for a security orchestration, automation, and response (SOAR) platform.