Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

New Intel CPU vulnerabilities known as MDS, ZombieLoad, Fallout and RIDL impact millions of devices. Affected vendors published advisories and blog posts with information for users. [Read More]
ZombieLoad, RIDL and Fallout: Intel processors are vulnerable to more speculative execution side-channel attacks that can allow malware to obtain sensitive data. [Read More]
Boost Mobile has warned an unspecified number of customers about unauthorized online account activity on March 14, 2019. [Read More]
A recently introduced bill, the Congressional Cybersecurity Training Resolution of 2019, requires all U.S. House members to undergo annual cybersecurity training. [Read More]
Symantec has appointed board member Rick Hill as interim president and CEO after Greg Clark has stepped down. [Read More]
The U.S. Justice Department announced charges against members of a hacking group operating in China allegedly responsible for the massive data breach at health insurer Anthem disclosed in 2015. [Read More]
DHS announces a new report detailing a piece of malware named ELECTRICFISH that North Korea’s Hidden Cobra (Lazarus) hackers use to tunnel traffic. [Read More]
Evident, an Atlanta-based company that specializes in identity and credential verification, raises $20 million in a Series B funding round. [Read More]
A former government intelligence analyst has been charged with leaking classified documents about military campaigns against terrorist group al-Qaeda to a reporter. [Read More]
Global information services giant Wolters Kluwer takes applications and platforms offline after discovering malware on its systems. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Gunter Ollmann's picture
As malware writers harness AI for cybercrime, the security industry must push forward with a new generation of dissection and detonation technologies to prepare for this coming wave.
Josh Lefkowitz's picture
It can be difficult for teams to determine how to obtain and incorporate data from encrypted chat service platforms into their collection strategies in a meaningful way.
Alastair Paterson's picture
While no digital risk framework is perfect, the optimal level of maturity will look to continually identify gaps, update processes and tooling, and reflect organizational changes.
Torsten George's picture
The anatomy of a hack has been glorified and led to the common belief that data breaches typically exploit zero-day vulnerabilities and require a tremendous amount of code sophistication.
Joshua Goldfarb's picture
If we want our security teams to master the art of stumbling onto great findings, we need to create the right surroundings to foster that.
Grady Summers's picture
Unlike buzzwords from prior years at RSA Conference, this year’s buzzwords are all throwbacks of sorts. They represent a return to fundamentals of information security.
Stan Engelbrecht's picture
Here are a few observations from my time at RSAC 2019 about SOAR and the cybersecurity world at large.
Marc Solomon's picture
You need a way to ensure your threat hunting efforts are focused on high-risk threats and that the team is operating efficiently since time is the enemy.
Josh Lefkowitz's picture
The best way for intelligence practitioners to identify what types of context their intelligence consumers truly need is simply to ask them.
Alastair Paterson's picture
By understanding where assets are exposed, their value to attackers, and how attackers target this data, organizations can make better decisions about their defenses and improve them over time.