Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Tenable’s new Predictive Prioritization service is designed to help customers of its vulnerability management offering prioritize flaws that have the greatest likelihood of being exploited. [Read More]
The Swiss government has launched a public bug bounty program with rewards of up to $50,000 for its e-voting systems. Researchers from all around the world invited to participate. [Read More]
There are over 7,400 instances of a refrigeration system exposed on the Internet due to the failure of owners to change the default password and implement other security measures. [Read More]
Huawei's top executive in Europe brushed off Western critics and defended the company's track record against accusations that it could serve as front for Chinese spying. [Read More]
France will soon make proposals to reinforce the security of mobile telephone networks, after the US stepped up pressure on Europe to block China's Huawei from building 5G networks. [Read More]
A US energy company, identified by some as Duke Energy, received a $10 million fine from the North American Electric Reliability Corporation (NERC) for nearly 130 violations of Critical Infrastructure Protection standards. [Read More]
GitHub helps developers keep the dependencies in their code secure and updated by integrating its Security Advisory API with Dependabot. [Read More]
The US intelligence community’s latest worldwide threat assessment warns that Russia and China are capable of disrupting critical infrastructure and Iran is not far behind. [Read More]
Salt Security emerges from stealth mode with a solution designed to identify and prevent API attacks and $10 million in funding. [Read More]
Facebook marks Data Privacy Day with launch of Privacy and Data Use Business Hub, which should help businesses understand how they can protect private information. [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Alastair Paterson's picture
Organizations’ perimeters will continue to erode as their digital footprints expand, but with the right risk protection strategy any organization can succeed in the age of digital transformation.
Grady Summers's picture
Companies in China are facing many of the same threats that your organization faces today, but they are addressing these threats at a massive scale, on emerging platforms, and with innovative approaches that we can learn from.
Marc Solomon's picture
The ability to customize threat intelligence scores allows you to prioritize threats to your organization and reevaluate and reprioritize as new data and context becomes available.
Joshua Goldfarb's picture
In some instances, it is precisely because we are so familiar and comfortable with something that makes us incapable of seeing that there is a better way.
Josh Lefkowitz's picture
A business risk intelligence (BRI) program needs to understand and account for the different categories of risk faced by all business functions across an enterprise.
Alastair Paterson's picture
Organizations that continuously monitor their digital footprint and understand their online exposure will be the most effective at mitigating digital risk in the new year.
Lance Cottrell's picture
We spend a lot of time thinking about and trying to mitigate threats that are so extreme you are basically already doomed if they are ever used against you.
Laurence Pitt's picture
Failure to implement basic cybersecurity hygiene practices will leave retailers vulnerable to damage and fines during a lucrative time for their businesses.
Alastair Paterson's picture
As you develop a brand protection program, here are five concrete things you can do now to proactively identify and mitigate risk to your brand.
Josh Lefkowitz's picture
It’s relatively commonplace for CTI and incident response teams to establish a coordinated response plan in preparation for a cyber attack, but—as demonstrated by WannaCry—it’s imperative for physical security teams to be involved in such plans as well.