Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

In an alert published this week, CISA and the FBI warned enterprises about the use of Tor in cyberattacks. [Read More]
Morocco's prime minister has demanded Amnesty International provide evidence to support its allegations that Rabat used spyware to bug a journalist's phone. [Read More]
The threat actor behind the Sodinokibi (REvil) ransomware is demanding a $14 million ransom from Brazilian-based electrical energy company Light S.A. [Read More]
Zoom announces the progress it has made in terms of security and privacy, but experts believe the company still faces many challenges. [Read More]
The necessary and dramatic migration to cloud-based tele-health services will undoubtedly leave the industry more exposed in the future. [Read More]
China on Wednesday demanded Washington stop “oppressing Chinese companies” after U.S. regulators declared telecom equipment suppliers Huawei and ZTE to be national security threats. [Read More]
Chinese telecommunication solutions providers Huawei and ZTE have been declared national security threats by the FCC. [Read More]
Threat hunting solutions provider Hunters today announced that it closed a $15 million Series A funding round, which brings the total raised by the company to $20.4 million. [Read More]
HackerOne has released a list of the companies that have paid out the most money through their bug bounty programs. [Read More]
Palo Alto Networks has patched a critical authentication bypass vulnerability in PAN-OS and US Cyber Command believes foreign APTs will likely attempt to exploit it soon. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Preston Hogue's picture
The healthcare industry will need advanced security measures to identify and mitigate flaws in new apps carrying the world’s most sensitive, regulated information.
Marc Solomon's picture
As security professionals, the power of human creativity, sharing and collaboration can help overcome challenges and keep businesses moving forward safely.
Joshua Goldfarb's picture
Even in toxic work environments, the security team must work to minimize risk and defend the organization from information security threats.
Marie Hattar's picture
Organizations should regularly put security products, processes and people to the test, and the reward is better, more efficient protection against attacks.
Marc Solomon's picture
The LEAD threat intelligence framework is a perfect example of the symbiosis between technology and people to strengthen security posture.
Joshua Goldfarb's picture
With the COVID-19 (Coronavirus) outbreak, business continuity, supply chain risk, and remote access have come to the forefront as security challenges that the business must deal with.
Gunter Ollmann's picture
Cyber range scenarios provide real insights into an organization’s capabilities and resilience against threats, along with the confidence to tackle them when they occur.
Marc Solomon's picture
It’s up to humans, guided by instinct, intelligence and experience, to determine the right data, so they can focus on what matters to the organization, make better decisions and take the right actions.
Laurence Pitt's picture
We’ve seen a shift away from ‘common themes’ across the RSA Conference to real development in plenty of new areas that truly advance cybersecurity.
Joshua Goldfarb's picture
How many times have you met someone full of promises and big on talk, only to be disappointed by what results from your engagement with them.