Security Experts:

long dotted


Researcher shows how much personal data is stored in web browsers and how readily it can be harvested [Read More]
Corero finds “kill switch” for the Memcached vulnerability that has fueled some of the largest distributed DDoS attacks in history [Read More]
The World Economic Forum (WEF) has launched the Fintech Cybersecurity Consortium, a new fintech-focused initiative to create a framework for the assessment of cybersecurity in financial technology firms and data aggregators. [Read More]
Memcrashed: memcached protocol abused by cybercriminals for significant DDoS amplification attacks, Cloudflare and Arbor Networks warn [Read More]
The adoption of chip-and-PIN technology by an increasing number of U.S. merchants has led to a 70% decrease in counterfeit card fraud, says Visa [Read More]
Intel, AMD, ARM, Apple, Amazon, Google and Microsoft respond to lawmakers’ questions regarding the disclosure of the Meltdown and Spectre CPU flaws [Read More]
U.S. SEC releases updated guidance on data breach disclosures and advises companies to adopt policies that ban executives from trading during security incident investigations [Read More]
Artificial intelligence could be deployed by dictators, criminals and terrorists to manipulate elections and use drones in terrorist attacks, experts say. [Read More]
U.S. Department of Justice creates new cybersecurity task force to help find ways to combat cyber threats and become more efficient in this area [Read More]
BitSight has published an analysis of the security posture of the federal supply chain, which shows a significant gap between the security performance of U.S. federal agencies and their contractors. [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Alastair Paterson's picture
Security teams need visibility outside the organization and across the widest range of data sources possible to mitigate digital risk and better protect the organization.
John Maddison's picture
Digital transformation and the accelerated evolution of cybercrime are the biggest challenges that IT security teams have ever had to face.
Steven Grossman's picture
Identifying those kinds of repeated non-malicious behaviors amongst a group of peers can help identify broken business processes that are requiring employees to violate policy in order to do their job.
Josh Lefkowitz's picture
With so many intelligence offerings, it’s important for prospective consumers to have a sense of what intelligence—if any—a vendor actually provides.
Justin Fier's picture
The insider threat is under-scrutinized by the security community, leaving networks vulnerable to compromise by their own employees, especially those with privileged access.
Josh Lefkowitz's picture
Real-time intelligence is exceedingly difficult to attain. Many current offerings are limited in how they can address the broad spectrum of threats and adversaries that exist today.
Steven Grossman's picture
How can a company protect its information and operations without running askew of data privacy laws and the concerns of its customers?
Preston Hogue's picture
No company has the ability to mitigate all risks at all times. No company I’ve ever visited has even had all of its identified risks treated at any given point.
Alastair Paterson's picture
Like a coach, you need to be able to see the big picture with an approach that monitors the entire Internet for risks to your business.
Torsten George's picture
By supplementing traditional perimeter defense mechanisms with data integrity, identity management, and risk-based prioritization principals, organizations can significantly reduce their exposure