Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

SafeBreach raises $15 million in Series B funding round, bringing the total raised by the company so far to $34 million [Read More]
Industrial cybersecurity firm Indegy announces new risk assessment service for operational technology (OT) environments [Read More]
Study conducted by Positive Technologies shows that industrial networks are often easy to hack from corporate systems [Read More]
Slack releases goSDL, an open source secure development lifecycle (SDL) tool designed to provide developers a tailored security checklist for their projects [Read More]
Join us for this live webinar, as security experts from Rapid7 walk through the need for and what it takes to implement and run a cybersecurity training and education program. [Read More]
A researcher has developed a tool that helps Mac laptop users detect evil maid attacks by monitoring the state of the device’s lid [Read More]
Drupal will release a follow-up patch for Drupalgeddon2 on April 25. Attackers continue to exploit the vulnerability to deliver various types of malware [Read More]
FDA reveals its plans for medical device cybersecurity, including requiring update and patch capabilities built into devices, updated guidance for protecting against risks, and policies and procedures for vulnerability disclosures [Read More]
AlienVault launches OTX Endpoint Threat Hunter, a free scanning service that allows organizations to identify threats and assess risk [Read More]
LinkedIn patches AutoFill vulnerability that could have been exploited to harvest data from users’ profiles [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Bradon Rogers's picture
While a contract, distributed, partner-oriented workforce and supply chain can create serious risks to your organization, careful implementation of visibility and data protection strategies can help you mitigate many of the risks.
Josh Lefkowitz's picture
Before finalizing a vendor relationship, it’s crucial to construct a response plan in preparation for any future incidents the vendor might experience.
Rafal Los's picture
If you're not careful, security becomes a hinderance and a target. Where security leaders create inflexible environments, security tends to struggle.
Steven Grossman's picture
Without an understanding of where you stand today, new security tools will result in more redundancy and gaps in protection.
Ashley Arbuckle's picture
Edna Conway, Cisco’s Chief Security Officer, Global Value Chain, discusses mitigating third-party security risk across an ecosystem that includes tens of thousands of partners located around the globe.
Josh Lefkowitz's picture
Decision advantage reinforces that the value of intelligence lies not in the intelligence itself but in the decisions it shapes and drives.
Joshua Goldfarb's picture
Those of us that spend our lives in security sometimes forget how our field looks and sounds to others.
Torsten George's picture
The Zero Trust Security model offers a very pragmatic blueprint for implementing identity and access management-based strategies to secure applications, devices, data, and infrastructure – both on-premise and in the cloud.
Alastair Paterson's picture
Security teams need visibility outside the organization and across the widest range of data sources possible to mitigate digital risk and better protect the organization.
John Maddison's picture
Digital transformation and the accelerated evolution of cybercrime are the biggest challenges that IT security teams have ever had to face.