Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Hackers possibly from China planted a backdoor in popular connectivity tools from NetSarang as part of a major supply chain attack [Read More]
Public cloud environments are the most secure, according to data collected over an 18-month period by Alert Logic [Read More]
Russia-linked cyberspy group APT28 targets hotels in Europe and their main target may be government and business travelers [Read More]
Version control systems Git, Subversion, Mercurial and CVS affected by command execution vulnerability [Read More]
An unnamed company is offering up to $250,000 for virtual machine (VM) hacks as part of a secret bug bounty program [Read More]
U.S. Department of Defense’s “Hack the Air Force” bug bounty program has earned researchers $130,000 for 207 valid submissions [Read More]
Microsoft patches 48 vulnerabilities, including a Windows Search flaw that has been actively exploited in attacks [Read More]
Microsoft finally announces decision on WoSign and StartCom certificates: new certificates issued after September 2017 will not be trusted [Read More]
Vulnerabilities found by a researcher in solar panels may allow hackers to disrupt power grids, but the affected vendor says his claims are greatly exaggerated [Read More]
Siemens warns customers that some of its medical imaging products are exposed to attacks due to Windows vulnerabilities exploited in the wild [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Josh Lefkowitz's picture
The Deep & Dark Web remains most familiar to cybersecurity and IT teams, but such intelligence can also benefit the mergers and acquisitions (M&A) due diligence process.
Adam Meyer's picture
By including digital risk monitoring as part of your threat intelligence capability, you can better understand your most critical areas of risk and the possible avenues of approach for adversaries.
Ashley Arbuckle's picture
Many organizations are not achieving the full benefits of digital transformation because they lack a comprehensive security program.
Steven Grossman's picture
Planning for cyber protection and resiliency is a large topic that requires the right framework and a balance of strategic and tactical thinking.
Adam Meyer's picture
With sound and timely operational threat intelligence, you can make life a lot harder for adversaries and have a much better understanding of how your organization is positioned against today's cyber threats.
Steven Grossman's picture
A series of events converged during the past few weeks that reemphasized the need for our industry to do a better job of establishing measurable and repeatable processes.
Torsten George's picture
The healthcare industry has experienced an onslaught of cyber-attacks over the last year, primarily driven by the fact that patient records are highly prized assets among cyber criminals.
Adam Meyer's picture
Business executives can benefit from strategic threat intelligence by gaining critical insights and establishing meaningful cybersecurity benchmarks.
Ashley Arbuckle's picture
In a globally interconnected world, knowledge-based economies are shaping our future, and vendor relationships are critical to success.
Torsten George's picture
Hackers are exploiting known vulnerabilities and are betting on the fact that organizations don’t know how to fix what really matters.