Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Google Cloud Identity & Access Management (IAM) users can now assign custom roles for fine-grained security [Read More]
The UK government has warned that Britain's most critical industries must boost their cyber security or face potentially hefty fines under the EU's Networks and Information Systems Directive (NISD). [Read More]
Kaspersky Lab files injunction in an effort to expedite its appeal against the DHS’s decision to ban government agencies from using the company’s products [Read More]
Class action lawsuits have been filed against AMD and Apple over Spectre and Meltdown CPU vulnerabilities [Read More]
BlackBerry launches Jarvis, a tool that helps companies in the automotive and other sectors scan their code for vulnerabilities and achieve compliance [Read More]
At least three class action lawsuits have been filed against Intel over the recently disclosed Spectre and Meltdown vulnerabilities [Read More]
DMARC implemented on roughly half of US government domains as a result of a DHS directive, but only 16% quarantine or reject unauthenticated emails [Read More]
Keeper Security files lawsuit against Ars Technica and reporter Dan Goodin over article covering critical vulnerability found by Google researcher [Read More]
Kaspersky files lawsuit against the U.S. government over the DHS operational directive ordering federal agencies to stop using the company’s products [Read More]
Cisco announces availability of Security Connector, an iOS app that gives organizations visibility and control for mobile devices [Read More]

FEATURES, INSIGHTS // Compliance

rss icon

Jalal Bouhdada's picture
Jalal Bouhdada, Founder and Principal ICS Security Consultant at Applied Risk, discusses the implications of the new EU Directive on Security of Network and Information Systems (NIS)
Steven Grossman's picture
Why do we seem to need layer upon layer of regulation and guidance to try to ensure a more secure business world? Is it working?
Travis Greene's picture
Reducing the amount of personal data subject to GDPR is a critical step towards minimizing the amount of risk that GDPR will expose.
Steven Grossman's picture
The PCI DSS 3.2 should greatly help companies reduce third party vendor risk, and is starting to shift from just a check-the-compliance-box activity to a more continuous compliance model.
Travis Greene's picture
To understand why return on Access Governance is lower versus other security technologies, we first need to understand why Access Governance is implemented in the first place.
Torsten George's picture
To achieve continuous compliance and monitoring, organizations are forced to automate many otherwise manual, labor-intensive tasks.
Torsten George's picture
The NIST Cybersecurity Framework is an important building block, but still just the first step towards implementing operationalized defenses against cyber security risks.
James McFarlin's picture
U.S tech giants are playing a game of high-stakes global brinksmanship around who has rights to control their data, which impacts their European growth prospects, business models, and ultimately stock valuations.
Mark Hatton's picture
The oversight for the protection of healthcare information is only getting tighter, and it is incumbent upon the security teams to ensure healthcare professionals have all the tools necessary to improve patient outcomes, while we worry about keeping the bad guys away.
Nimmy Reichenberg's picture
With the release of PCI-DSS 3.0, organizations have a framework for payment security as part of their business-as-usual activities by introducing more flexibility, and an increased focus on education, awareness and security as a shared responsibility.