Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Researchers warned that one of the mitigations proposed by F5 for the actively exploited BIG-IP vulnerability can be bypassed, but malicious hackers leveraged the bypass before public disclosure. [Read More]
China's ambassador to Britain on Monday warned that London faced a risk to its international reputation if it blocked Huawei from the nation's 5G network. [Read More]
China urged France Monday to guarantee a "fair and just" environment for its companies after Paris decided to restrict licenses for telecom operators using 5G technology from Huawei. [Read More]
The NSA has published a series of recommendations on how to properly configure IP Security (IPsec) VPNs. [Read More]
China's Huawei is not totally banned from France's next-generation 5G wireless market, but French operators using them will only get limited licences. [Read More]
In an alert published this week, CISA and the FBI warned enterprises about the use of Tor in cyberattacks. [Read More]
The necessary and dramatic migration to cloud-based tele-health services will undoubtedly leave the industry more exposed in the future. [Read More]
Chinese telecommunication solutions providers Huawei and ZTE have been declared national security threats by the FCC. [Read More]
Palo Alto Networks has patched a critical authentication bypass vulnerability in PAN-OS and US Cyber Command believes foreign APTs will likely attempt to exploit it soon. [Read More]
India has banned 59 Chinese mobile apps, including the wildly popular TikTok and WeChat, over national security and privacy concerns two weeks after a deadly Himalayan border clash between the nuclear-armed neighbours. [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Idan Aharoni's picture
The threat intelligence space is filled with great vendors who can provide organizations with a lot of value in helping them protect their brand, employees and customers.
Jim Ducharme's picture
Heightened anxiety is a normal consequence of drastic change, and it’s natural for the entire organization to be stressed by the shift to a fully remote work environment.
Laurence Pitt's picture
What can we do in order to prevent the spread of fake content or reduce the risk of a targeted use of Deepfakes that could cause damage to our organization?
Joshua Goldfarb's picture
Gap analysis can serve as a wonderful driver for improving security metrics if the security team understands how to seize the opportunity it presents.
AJ Nash's picture
Once we shed the shackles of “cyber” and “threat,” we free our teams to consider a full spectrum of intelligence, including support to physical security, insider threats, procurement, mergers and acquisitions, and executive decision-making.
Fred Kneip's picture
While some forward-thinking companies have created c-suite positions for IT and security personnel such as CTOs and CISOs, these are, overall, still relatively rare.
Josh Lefkowitz's picture
The successful execution of each step of the intelligence cycle relies on the successful execution of the step that came before it.
Fred Kneip's picture
Third party cyber risk management programs need to go beyond an initial scan and evaluate your third party’s security from the inside out.
Josh Lefkowitz's picture
It’s crucial to recognize that annual security predictions generally only include that which can be feasibly predicted by the final months of the prior year.
Marie Hattar's picture
The solution: every week, devote at least two hours to basic cyber hygiene. Four best practices will help your team build habit from repetition.