Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The US Treasury has extended by seven days the November 27 deadline given to the Chinese owner of TikTok to sell the popular social media platform's American business. [Read More]
Home Depot agreed to a $17.5 million settlement with the attorney generals of 46 states and the District of Columbia over the massive data breach suffered by the home improvement retailer in 2014. [Read More]
Telecom companies in Britain face hefty fines if they don’t comply with strict new security rules under a new law proposed in Parliament that is aimed at blocking high-risk equipment suppliers like China’s Huawei. [Read More]
Canadian Prime Minister Justin Trudeau -- under pressure from the opposition to ban Huawei from the country's 5G networks -- refused to say Tuesday when he might make his decision, or if it would come before year's end. [Read More]
Cybersecurity solutions provider Trend Micro this week announced the release of a free tool designed to help users boost their privacy online and fight misinformation. [Read More]
The IoT Cybersecurity Improvement Act, which aims to improve the security of IoT devices, has passed the Senate and is heading to the White House for the president’s signature. [Read More]
FireEye Mandiant has delivered its cyber landscape predictions for the coming year, including growing and affiliate-supported espionage, increased targeting of OT by ransomware, and continued targeting of healthcare. [Read More]
A report published this week by industrial cybersecurity firm Dragos reveals that the manufacturing sector is targeted by five ICS-focused threat groups. [Read More]
President Donald Trump's administration said Wednesday it was still working to resolve its security concerns over Chinese-owned app TikTok after the firm sought to delay a deadline to sell its US operations. [Read More]
A Swedish court has suspended a decision banning Huawei equipment from the country's 5G network while it considers the merits of the case against the Chinese telecoms giant. [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Tim Bandos's picture
Keeping a ‘six foot distance’ between our digital home life and digital work life can go a long way when it comes to safeguarding our most sensitive data, too.
AJ Nash's picture
Knowing that threat intelligence is readily available and proving its worth is one thing, understanding how to use it within your security operations program is quite another.
Marc Solomon's picture
When intelligence becomes a capability and not just subscriptions to feeds, we can gain the full value of intelligence as the foundation to security operations.
Torsten George's picture
Today’s dynamic threatscape requires security professionals to adjust to an ever-expanding attack surface.
Derek Manky's picture
It’s amazing how foundational security principles, consistently implemented, can help defeat the craftiest attack vector.
John Maddison's picture
By understanding the latest threat trends, security teams can take measures to ensure that their security strategies, including the identification and tracking of new IOCs, are being correctly updated.
Matt Morris's picture
Companies must instill a culture of resilience in which security improvements are emphasized as a fundamental component of an organization’s individual corporate culture
Preston Hogue's picture
From a cybersecurity perspective, perhaps the greatest risk for digital education comes from the wide variation across districts in terms of resources.
Alastair Paterson's picture
Opportunities for accidental exposure of sensitive information are often compounded by multiple stakeholders using collaborative tools without the proper policies, oversight and security training.
AJ Nash's picture
Intelligence is one of a few vital security concepts that industries are increasing their investments in as they recognize the documented value of proactive security.