Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Chinese telecom company Huawei on Tuesday criticized the Estonian government and media for spreading what it says are “arbitrary and unfounded” allegations about cybersecurity risks related to the company’s mobile phones. [Read More]
Germany released draft security guidelines on Tuesday for next generation wireless networks that stopped short of banning Huawei, as the U.S. warned again it would reconsider intelligence sharing with allies that use the Chinese company’s equipment. [Read More]
Chinese tech giant Huawei said on Wednesday that its revenue for the first nine months of the year grew by almost a quarter despite a US campaign to isolate the company globally. [Read More]
Facebook announces an expansion to its bug bounty program for third-party apps, as well as a series of bonuses for bugs in native products. [Read More]
An intrusion prevention signature update delivered by Symantec to Endpoint Protection customers has caused many devices to crash and display a BSOD. [Read More]
Researchers discovered over 550 fake presidential election-themed domains targeting Republicans, Democrats and their funding websites. [Read More]
Some services at global shipping and ecommerce giant Pitney Bowes disrupted after a file-encrypting ransomware infected some systems. [Read More]
Private equity firm Thoma Bravo has made an offer to acquire UK-based cybersecurity firm Sophos for $3.9 billion. [Read More]
Imperva says hackers obtained Cloud WAF customer data after they stole an AWS API key that gave them access to a database snapshot created for testing purposes. [Read More]
DCH Health System said key operations were back to normal 10 days after a ransomware attack encrypted information and prevented its hospital computer systems from communicating with each other. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Marc Solomon's picture
National Cybersecurity Awareness Month (NCSAM) is a great vehicle to raise awareness for cybersecurity and to remind every organization that the ability to improve security operations begins with contextual awareness.
Josh Lefkowitz's picture
Here’s a crash-course on the intelligence cycle and how you can apply and derive value from its core principles—no matter your role or security discipline:
Joshua Goldfarb's picture
The time to get serious about metrics is long overdue. It is in this spirit that I offer five helpful tips for building meaningful security metrics.
Torsten George's picture
Until government agencies start implementing identity-centric security measures, account compromise attacks will continue to provide a perfect cover for data breaches.
Marc Solomon's picture
Five things you should know about incident pruning and how to apply it to improve investigations, threat hunting and incident response.
Josh Lefkowitz's picture
A use case-centric approach to threat intelligence can yield substantial benefits and is absolutely worth pursuing. It just needs to be pursued properly.
Jim Gordon's picture
Intel's Jim Gordon presents critical top 10 tactical action items every SMB should take to protect itself.
Gunter Ollmann's picture
Any bug hunter, security analyst, software vendor, or device manufacturer should not rely on CVSS as the pointy end of the stick for prioritizing remediation.
Marc Solomon's picture
Visualization holds the key for quickly understanding patterns and determining which threads to pull.
Torsten George's picture
While the urge to hack back after a data breach is very appealing, going back to the basics and applying proper cyber hygiene is a better alternative.