Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The NSA has published a series of recommendations on how to properly configure IP Security (IPsec) VPNs. [Read More]
China's Huawei is not totally banned from France's next-generation 5G wireless market, but French operators using them will only get limited licences. [Read More]
In an alert published this week, CISA and the FBI warned enterprises about the use of Tor in cyberattacks. [Read More]
The necessary and dramatic migration to cloud-based tele-health services will undoubtedly leave the industry more exposed in the future. [Read More]
Chinese telecommunication solutions providers Huawei and ZTE have been declared national security threats by the FCC. [Read More]
Palo Alto Networks has patched a critical authentication bypass vulnerability in PAN-OS and US Cyber Command believes foreign APTs will likely attempt to exploit it soon. [Read More]
India has banned 59 Chinese mobile apps, including the wildly popular TikTok and WeChat, over national security and privacy concerns two weeks after a deadly Himalayan border clash between the nuclear-armed neighbours. [Read More]
Australia unveiled the "largest-ever" boost in cybersecurity spending, days after Prime Minister Scott Morrison spoke out about a wave of state-sponsored attacks suspected to have been carried out by China. [Read More]
Many companies view the SOC as a key part of their security strategy, but SOC staff complain about high stress and the lack of proper tools. [Read More]
Hackers are confident that they will outperform AI for the next 10 years when it comes to finding vulnerabilities, Bugcrowd study shows. [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Jim Ducharme's picture
Heightened anxiety is a normal consequence of drastic change, and it’s natural for the entire organization to be stressed by the shift to a fully remote work environment.
Laurence Pitt's picture
What can we do in order to prevent the spread of fake content or reduce the risk of a targeted use of Deepfakes that could cause damage to our organization?
Joshua Goldfarb's picture
Gap analysis can serve as a wonderful driver for improving security metrics if the security team understands how to seize the opportunity it presents.
AJ Nash's picture
Once we shed the shackles of “cyber” and “threat,” we free our teams to consider a full spectrum of intelligence, including support to physical security, insider threats, procurement, mergers and acquisitions, and executive decision-making.
Fred Kneip's picture
While some forward-thinking companies have created c-suite positions for IT and security personnel such as CTOs and CISOs, these are, overall, still relatively rare.
Josh Lefkowitz's picture
The successful execution of each step of the intelligence cycle relies on the successful execution of the step that came before it.
Fred Kneip's picture
Third party cyber risk management programs need to go beyond an initial scan and evaluate your third party’s security from the inside out.
Josh Lefkowitz's picture
It’s crucial to recognize that annual security predictions generally only include that which can be feasibly predicted by the final months of the prior year.
Marie Hattar's picture
The solution: every week, devote at least two hours to basic cyber hygiene. Four best practices will help your team build habit from repetition.
Joshua Goldfarb's picture
Security metrics is a topic that, while challenging, is also important and at the top of the priority list for security organizations. Here are five tips for leveraging security metrics to keep your organization out of the lion’s den.