Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

SecurityWeek's Supply Chain Security Summit will examine the current state of supply chain attacks, the weakest links along the way, the biggest supply chain hacks in history, and best practices for managing this massive attack surface. [Read More]
Following the recent attack on the U.S. Capitol, where a parade of people stormed the building and gained access to unprotected computers, industry professionals share thoughts on what they would do if they were in charge of cybersecurity at an organization that could end up in a similar situation. [Read More]
The United States and Australia on Friday announced a partnership for the continuous development of a virtual cyber training range. [Read More]
U.S. FERC and NERC release a report outlining cyber incident response and recovery best practices for electric utilities. [Read More]
CISA has launched the Cyber Career Pathways Tool, which aims to lay out a career path for current and future cybersecurity professionals. [Read More]
Information security training and certification provider Offensive Security this week announced the acquisition of VulnHub, an open-source catalog of security training resources. [Read More]
Cybersecurity training company RangeForce raises $16 million in a Series A funding round. [Read More]
SecurityWeek’s Enterprise Lockdown will allow attendees from around the world to immerse themselves in a virtual world to learn about and discuss the latest cybersecurity threats and challenges facing enterprise organizations. [Read More]
New rules require critical information infrastructure operators in China to conduct cybersecurity reviews when purchasing tech products and services. [Read More]
Kaspersky has teamed up with SecurityWeek for a three-day virtual event where researchers and other industry professionals will discuss malware, exploits, threat hunting, and other interesting topics. [Read More]

FEATURES, INSIGHTS // Training & Certification

rss icon

Rob Fry's picture
By taking some lessons from outside our cybersecurity sandbox, we can address some of the significant challenges in cybersecurity.
Gordon Lawson's picture
Everyone is familiar with the three legs of cybersecurity stool: people, processes and technology. But most companies typically invest in just one area – technology.
Derek Manky's picture
With the pandemic creating a massive remote work shift and consequent rises in cyber risk, finding individuals with cybersecurity skills is harder than ever.
Gunter Ollmann's picture
Cyber range scenarios provide real insights into an organization’s capabilities and resilience against threats, along with the confidence to tackle them when they occur.
Joshua Goldfarb's picture
Change may not always be on the docket, but when it is, how can we embrace it, understand it, and work to create a constructive environment around it?
Joshua Goldfarb's picture
The time to get serious about metrics is long overdue. It is in this spirit that I offer five helpful tips for building meaningful security metrics.
Stan Engelbrecht's picture
Here are a few observations from my time at RSAC 2019 about SOAR and the cybersecurity world at large.
Torsten George's picture
Cyber attackers long ago figured out that the easiest way for them to gain access to sensitive data is by compromising an end user’s identity and credentials.
Ashley Arbuckle's picture
We’ve seen an evolution from more traditional simulation exercises that use a Red Team to identify vulnerabilities and launch mock attacks and a Blue Team to detect and respond to attacks, to Purple Teaming exercises.
Michael Moniz's picture
To be an outstanding cybersecurity professional, you need to think outside of the box, be intellectually curious, self-sufficient and collaborative.