Security Experts:

Management & Strategy
long dotted


ICS vendors are assessing the impact of the Meltdown and Spectre vulnerabilities, but extensive testing is needed before any patches can be applied [Read More]
AMD will soon provide optional processor microcode updates designed to mitigate Spectre attacks. Meltdown does not impact the company's CPUs [Read More]
Senators, Elizabeth Warren, D-Mass., and Mark Warner, D-Va, introduced a bill that would provide the Federal Trade Commission (FTC) with punitive powers over the credit reporting industry. [Read More]
Arctic Wolf Networks, a Sunnyvale, Calif.-based company that offers outsourced security operations center (SOC) services, has raised $16 million in new funding. [Read More]
The Meltdown patch released by Canonical for Ubuntu has caused some systems to fail to boot. A new kernel update fixes the problem [Read More]
Russia-linked hackers leaked private correspondence between International Olympic Committee officials in response to Russia being banned from the Pyeongchang 2018 Winter Games [Read More]
NVIDIA releases updates for GPU display drivers and other products to address the Spectre and Meltdown vulnerabilities [Read More]
IBM starts releasing firmware updates for its POWER processors to address the recently disclosed Meltdown and Spectre vulnerabilities [Read More]
Rockwell Automation patches high severity vulnerability in MicroLogix 1400 controllers. Flaw allows DoS attacks and possibly remote code execution [Read More]
Microsoft says users with older CPUs will notice a decrease in performance after applying the Spectre and Meltdown updates [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Steven Grossman's picture
How can a company protect its information and operations without running askew of data privacy laws and the concerns of its customers?
Preston Hogue's picture
No company has the ability to mitigate all risks at all times. No company I’ve ever visited has even had all of its identified risks treated at any given point.
Alastair Paterson's picture
Like a coach, you need to be able to see the big picture with an approach that monitors the entire Internet for risks to your business.
Justin Fier's picture
With a skills gap of over a million cyber security professionals worldwide, how can organizations stay ahead of sophisticated and fast-moving attacks?
Erin O’Malley's picture
I promise to be more diligent about my personal cybersecurity, starting with five easy tasks that can help me – or anyone – improve online safety.
Torsten George's picture
By supplementing traditional perimeter defense mechanisms with data integrity, identity management, and risk-based prioritization principals, organizations can significantly reduce their exposure
Ashley Arbuckle's picture
Closing the cybersecurity knowledge gap can provoke real, long-term change, and create a new perspective that not only protects customers and revenue, but also lifts-up your organization as a leader in its industry.
Alastair Paterson's picture
Remember that cybercriminals will shift targets and evolve their tactics, techniques and procedures (TTPs) throughout the year.
Steven Grossman's picture
President Ronald Reagan taught us to “trust but verify,” meaning trust is great, but blind trust is dangerous.
Josh Lefkowitz's picture
These tips and best practices will provide insight into some of the key components and processes of a successful usiness Risk Intelligence (BRI) program.