Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

When state election officials gathered ahead of the last presidential election, major topics were voter registration, identity theft and ballot design. This year, the main theme is election security. [Read More]
The U.S. Defense Department wants companies hoping to obtain defense contracts to demonstrate that they can keep sensitive information safe. [Read More]
A major exercise whose goal was to test the cyber and physical security of North America’s grid has enabled the energy industry and governments to review and improve incident response plans and collaboration. [Read More]
Consulting giant Accenture launches three cyber ranges designed to help industrial companies practice their cyberattack response plan. [Read More]
Immersive Labs, a company that provides an interactive and gamified cyber skills platform, has raised $40 million in a series B funding round. [Read More]
FireEye surveyed over 800 cybersecurity executives from around the world and most of them believe cybersecurity solutions are either inexpensive or their cost is reasonable for the value they provide. [Read More]
Given the difficulties in designing, conducting and interpreting vendor surveys, it is necessary to question the value of them, both individually and collectively. [Read More]
Microsoft is working with PC manufacturing and silicon partners to design devices with a more secure firmware layer. [Read More]
The Cyber Security Agency of Singapore (CSA) has published the country’s Operational Technology Cybersecurity Masterplan. [Read More]
Immersive Labs has integrated MITRE ATT&CK into its skills development platform, allowing organizations to map and manage specific people's skills to actual risks. [Read More]

FEATURES, INSIGHTS // Training & Certification

rss icon

Gunter Ollmann's picture
Cyber range scenarios provide real insights into an organization’s capabilities and resilience against threats, along with the confidence to tackle them when they occur.
Joshua Goldfarb's picture
Change may not always be on the docket, but when it is, how can we embrace it, understand it, and work to create a constructive environment around it?
Joshua Goldfarb's picture
The time to get serious about metrics is long overdue. It is in this spirit that I offer five helpful tips for building meaningful security metrics.
Stan Engelbrecht's picture
Here are a few observations from my time at RSAC 2019 about SOAR and the cybersecurity world at large.
Torsten George's picture
Cyber attackers long ago figured out that the easiest way for them to gain access to sensitive data is by compromising an end user’s identity and credentials.
Ashley Arbuckle's picture
We’ve seen an evolution from more traditional simulation exercises that use a Red Team to identify vulnerabilities and launch mock attacks and a Blue Team to detect and respond to attacks, to Purple Teaming exercises.
Michael Moniz's picture
To be an outstanding cybersecurity professional, you need to think outside of the box, be intellectually curious, self-sufficient and collaborative.
Joshua Goldfarb's picture
Writing and documenting aren’t the most exciting activities. But they have tremendous potential, both in improving security operations and incident response, as well as in opening up a constructive dialogue.
Travis Greene's picture
Attended by roughly 40,000 people, RSA Conference 2016 was the biggest ever. Here are some observations on security trends observed at the event that took place last week at the conference.
Alastair Paterson's picture
Cyber Threat Intelligence (CTI) is critical for organizations that want to gain a comprehensive, tailored and relevant view of the potential threats and types of attackers that could be targeting them.