Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

SecurityWeek is publishing a daily digest summarizing some of the announcements made by vendors at the RSA Conference 2022. [Read More]
CISA has provided clarifications on the criteria for adding vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. [Read More]
SecurityWeek is publishing a daily digest summarizing some of the announcements made by vendors at the RSA Conference 2022. [Read More]
Whistic raises $35 million to help organizations make informed decisions by learning more about vendors’ security posture. [Read More]
Tech giant IBM plans to acquire early-stage attack surface management startup Randori in a deal that signals a major expansion of Big Blue’s cybersecurity ambitions. [Read More]
SecurityWeek is publishing a daily digest summarizing some of the announcements made by vendors at the RSA Conference 2022. [Read More]
CybSafe raises $28 million in a Series B funding round led by Evolution Equity Partners. [Read More]
Sequoia is leading a massive $50 million early-stage investment in Chainguard, a startup created by a team of ex-Google software engineers to "make software supply chain secure by default." [Read More]
Out of 5.4 million identified MySQL servers, 3.6 million accept connections on port 3306/TCP. [Read More]
The FBI has issued an alert to inform US colleges and universities that their credentials are being sold on cybercrime forums. [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

AJ Nash's picture
As you build your cyber intelligence program – and have all the vendors lined up to take your money – don’t overlook the importance of investing in the right people.
Laurence Pitt's picture
Many security teams will have to reduce budget against projects scheduled for 2021, with funds being re-allocated to pandemic-related business and workforce enablement
Tim Bandos's picture
Keeping a ‘six foot distance’ between our digital home life and digital work life can go a long way when it comes to safeguarding our most sensitive data, too.
AJ Nash's picture
Knowing that threat intelligence is readily available and proving its worth is one thing, understanding how to use it within your security operations program is quite another.
Marc Solomon's picture
When intelligence becomes a capability and not just subscriptions to feeds, we can gain the full value of intelligence as the foundation to security operations.
Torsten George's picture
Today’s dynamic threatscape requires security professionals to adjust to an ever-expanding attack surface.
Derek Manky's picture
It’s amazing how foundational security principles, consistently implemented, can help defeat the craftiest attack vector.
John Maddison's picture
By understanding the latest threat trends, security teams can take measures to ensure that their security strategies, including the identification and tracking of new IOCs, are being correctly updated.
Matt Morris's picture
Companies must instill a culture of resilience in which security improvements are emphasized as a fundamental component of an organization’s individual corporate culture
Preston Hogue's picture
From a cybersecurity perspective, perhaps the greatest risk for digital education comes from the wide variation across districts in terms of resources.