Security Experts:

long dotted


Many security professionals in the energy sector are concerned that a cyberattack on industrial control systems could have “catastrophic” consequences [Read More]
CrowdStrike unveils new Falcon Endpoint Protection Complete solution and a threat analysis subscription module for the Falcon platform [Read More]
IBM releases Adversarial Robustness Toolbox, an open source software library designed to help researchers and developers secure artificial intelligence (AI) systems [Read More]
A technical alert issued by the US and UK details how Russian state-sponsored hackers target government and private-sector organizations by abusing various networking protocols [Read More]
IBM adds intelligent orchestration capabilities to incident response platform and launches new threat and vulnerability management service [Read More]
SirenJack attack allows hackers to remotely activate warning sirens such as the ones used by major cities, military facilities, universities, and industrial sites [Read More]
Cisco advises organizations to patch and secure switches to protect them against attacks abusing the Smart Install protocol. Hundreds of thousands of systems exposed and critical infrastructure is at risk [Read More]
Intel will not release patches for some CPUs affected by Meltdown and Spectre, including Bloomfield (Xeon), Clarksfield, Gulftown, Harpertown Xeon, Jasper Forest, Penryn/QC, SoFIA 3GR, Wolfdale (Xeon) and Yorkfield (Xeon) [Read More]
Drupal patches highly critical remote code execution vulnerability that allows hackers to easily hijack websites. Over one million sites affected and exploits could be created any minute [Read More]
GitHub says the introduction of security alerts has led to a significantly smaller number of vulnerable code libraries [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Rafal Los's picture
If you're not careful, security becomes a hinderance and a target. Where security leaders create inflexible environments, security tends to struggle.
Steven Grossman's picture
Without an understanding of where you stand today, new security tools will result in more redundancy and gaps in protection.
Ashley Arbuckle's picture
Edna Conway, Cisco’s Chief Security Officer, Global Value Chain, discusses mitigating third-party security risk across an ecosystem that includes tens of thousands of partners located around the globe.
Josh Lefkowitz's picture
Decision advantage reinforces that the value of intelligence lies not in the intelligence itself but in the decisions it shapes and drives.
Joshua Goldfarb's picture
Those of us that spend our lives in security sometimes forget how our field looks and sounds to others.
Torsten George's picture
The Zero Trust Security model offers a very pragmatic blueprint for implementing identity and access management-based strategies to secure applications, devices, data, and infrastructure – both on-premise and in the cloud.
Alastair Paterson's picture
Security teams need visibility outside the organization and across the widest range of data sources possible to mitigate digital risk and better protect the organization.
John Maddison's picture
Digital transformation and the accelerated evolution of cybercrime are the biggest challenges that IT security teams have ever had to face.
Steven Grossman's picture
Identifying those kinds of repeated non-malicious behaviors amongst a group of peers can help identify broken business processes that are requiring employees to violate policy in order to do their job.
Josh Lefkowitz's picture
With so many intelligence offerings, it’s important for prospective consumers to have a sense of what intelligence—if any—a vendor actually provides.