Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Hackers continue to look for Pulse Secure and Fortinet devices affected by recently disclosed flaws, but both companies have taken steps to protect customers. [Read More]
The Libra Association, the organization in charge of Facebook’s Libra cryptocurrency, has launched a public bug bounty program with rewards of up to $10,000. [Read More]
Data collected by Kaspersky shows that nearly half of SMBs and enterprises are still using Windows 7, for which extended support will end in just a few months. [Read More]
A recent Federal Information Security Modernization Act (FISMA) annual report indicates considerable success in improving the cybersecurity of federal agencies, but some have voiced concerns over weakness in the method of reporting. [Read More]
All Sphinx servers that are exposed to the Internet are prone to abuse by cybercriminals, as they can be accessed by anyone. [Read More]
Bucharest could exclude Chinese giant Huawei from its future 5G network, according to a joint statement signed by the Romanian and US presidents. [Read More]
Twitter and Facebook suspend accounts believed to be part of a Chinese government influence campaign targeting Hong Kong protests. [Read More]
GitHub announced that its token scanning service now also checks commits for accidentally shared Atlassian, Dropbox, Discord, Proctorio and Pulumi tokens. [Read More]
Facebook announces that its Data Abuse Bounty program now includes Instagram, and the company has invited some security researchers to test Instagram’s new Checkout feature. [Read More]
A survey of over 2,000 Americans shows that cybersecurity has become a political issue and most believe that cybersecurity should be a top priority for the government. [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Gunter Ollmann's picture
Any bug hunter, security analyst, software vendor, or device manufacturer should not rely on CVSS as the pointy end of the stick for prioritizing remediation.
Torsten George's picture
A gradual improvement in cyber hygiene can go a long way toward keeping an organization immune from security infections and minimizing the risk of falling victim to a cyber-attack.
Ashley Arbuckle's picture
The convergence of security products and services is a welcomed development and will lead to improved security.
Ellison Anne Williams's picture
While threats facing private industry and government may once have looked distinctly different, the line separating attackers pursuing these two arenas is now so blurred that it’s often hard to distinguish one from another.
Gunter Ollmann's picture
CISOs should invest time in applying the resources of public cloud to bring automation, scalability, and AI to solving the given problem as a platform for all customers – past, present, and future.
Justin Fier's picture
As innovative attacks continue to expand the purview of cyber security, helping CISOs means equipping them with equally innovative tools that stand a fighting chance.
Josh Lefkowitz's picture
It can be difficult for teams to determine how to obtain and incorporate data from encrypted chat service platforms into their collection strategies in a meaningful way.
Alastair Paterson's picture
While no digital risk framework is perfect, the optimal level of maturity will look to continually identify gaps, update processes and tooling, and reflect organizational changes.
Josh Lefkowitz's picture
The best way for intelligence practitioners to identify what types of context their intelligence consumers truly need is simply to ask them.
Alastair Paterson's picture
By understanding where assets are exposed, their value to attackers, and how attackers target this data, organizations can make better decisions about their defenses and improve them over time.