Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Flashpoint Intelligence Platform 3.0 aims to convert and present the raw intelligence gleaned from the deep and dark web as actionable business risk intelligence. [Read More]
White hat hackers show how easy it is to bypass the iris recognition system on Samsung’s Galaxy S8 smartphones [Read More]
WikiLeaks detailed Athena, a malware developed by the CIA with a U.S. offensive-driven cybersecurity firm. The tool works on all versions of Windows [Read More]
Some experts believe the WannaCry ransomware attacks don’t fit North Korea’s style and interests, despite malware code similarities [Read More]
Medical devices also infected with WannaCry ransomware. Several manufacturers release security advisories [Read More]
Researcher earns $5,000 for information disclosure vulnerability found in Google’s intranet login page [Read More]
The latest Joomla update patches a critical SQL injection vulnerability that can be easily exploited by remote attackers [Read More]
More than 200 Brooks Brothers stores hit by payment card breach. Hackers had access to payment processing systems for nearly a year [Read More]
Researchers are confident that the APT3 (Gothic Panda, UPS Team) cyber espionage group is linked to the Chinese Ministry of State Security [Read More]
Public bug bounty program launched for WordPress CMS, WordPress.org websites, BuddyPress, bbPress and GlotPress [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Danelle Au's picture
When a vendor comes in for a presentation and, after only a few minutes, claims to know precisely what your challenges are and how to solve them, that’s a major red flag for the confident CISO.
Marc Solomon's picture
To harness the power embedded in disparate sources of threat data requires aggregating it and translating it into a uniform format for analysis and action.
Ashley Arbuckle's picture
In a globally interconnected world, knowledge-based economies are shaping our future, and vendor relationships are critical to success.
Torsten George's picture
Hackers are exploiting known vulnerabilities and are betting on the fact that organizations don’t know how to fix what really matters.
Steven Grossman's picture
President Trump's cybersecurity executive order touches on activities that indirectly but significantly impact government agencies’ cyber risk posture.
Josh Lefkowitz's picture
Safeguarding critical assets, proactively addressing cyber and physical threats, and assessing and mitigating risk accurately and effectively requires comprehensive visibility into both the Deep and the Dark Web.
Adam Meyer's picture
Different intelligence consumers in your organization create and consume varying levels of threat intel to take appropriate actions against identified risks.
Joshua Goldfarb's picture
The European Union’s General Data Protection Regulation includes an aspect that seems particularly relevant to the field of security operations and incident response.
Marc Solomon's picture
Security professionals want insights into the adversaries themselves – the tools as well as the tactics, techniques and procedures (TTPs) they’re using – to strengthen defenses and make life much more difficult for the bad guys.
Torsten George's picture
Unfortunately, a significant portion of information security resources are consumed by data gathering and aggregation processes.