Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Senators this week introduced a bill aimed at banning the use of the China-made TikTok application on government devices. [Read More]
Facebook and other tech companies need to be regulated like the tobacco industry, warned Christopher Wylie, the whistleblower who exposed the Cambridge Analytica scandal. [Read More]
Researchers say there are over 600 legitimate Microsoft subdomains that can be hijacked and abused for phishing, malware delivery and scams. [Read More]
Although businesses are increasingly at risk for cyberattacks on their mobile devices, many aren’t taking steps to protect smartphones and tablets. [Read More]
Researchers have analyzed 20 of the most popular Docker container images and found that while they contain many vulnerabilities, less than half of these flaws pose an actual risk. [Read More]
Washington has the right to block US federal agencies from buying products by Huawei on cybersecurity grounds, a judge has ruled, dismissing the Chinese telecom giant's legal challenge to a purchase ban. [Read More]
The United States' ambassador to Germany said Sunday that President Donald Trump had threatened to cut off intelligence-sharing with countries that dealt with Chinese tech firm Huawei. [Read More]
Rising interest in electronic voting has heightened concerns among security experts who fear these systems are vulnerable to hacking and manipulation that could undermine confidence in election results. [Read More]
Many upstream oil and gas companies invested in cybersecurity in 2019, according to a survey conducted by Accenture. [Read More]
Microsoft announced that Safe Documents and Application Guard, two security capabilities introduced last fall, are now available to more of its Office 365 ProPlus customers. [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Laurence Pitt's picture
What can we do in order to prevent the spread of fake content or reduce the risk of a targeted use of Deepfakes that could cause damage to our organization?
Joshua Goldfarb's picture
Gap analysis can serve as a wonderful driver for improving security metrics if the security team understands how to seize the opportunity it presents.
AJ Nash's picture
Once we shed the shackles of “cyber” and “threat,” we free our teams to consider a full spectrum of intelligence, including support to physical security, insider threats, procurement, mergers and acquisitions, and executive decision-making.
Fred Kneip's picture
While some forward-thinking companies have created c-suite positions for IT and security personnel such as CTOs and CISOs, these are, overall, still relatively rare.
Josh Lefkowitz's picture
The successful execution of each step of the intelligence cycle relies on the successful execution of the step that came before it.
Fred Kneip's picture
Third party cyber risk management programs need to go beyond an initial scan and evaluate your third party’s security from the inside out.
Josh Lefkowitz's picture
It’s crucial to recognize that annual security predictions generally only include that which can be feasibly predicted by the final months of the prior year.
Marie Hattar's picture
The solution: every week, devote at least two hours to basic cyber hygiene. Four best practices will help your team build habit from repetition.
Joshua Goldfarb's picture
Security metrics is a topic that, while challenging, is also important and at the top of the priority list for security organizations. Here are five tips for leveraging security metrics to keep your organization out of the lion’s den.
Craig Harber's picture
As long as organizations continue to employ simplistic “set it and forget it” security approaches, they will be forced into playing reactive, catch-up defense against cyber attackers.