Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Vulnerabilities in the popular WordPress plugin Formidable Forms expose sensitive data and allow hackers to hijack websites [Read More]
Oracle patches several vulnerabilities, including two rated critical, in the Jolt server component of the company’s Tuxedo product [Read More]
Authentication bypass and remote code execution flaws found in Siemens SICAM RTU. No patches available as product has been discontinued [Read More]
A new global survey highlights the disconnect between security expectations and security reality for many IT/security professionals. [Read More]
Following an increase in Android malware and adware abusing accessibility services, Google decides to crack down on apps that misuse the feature [Read More]
Pentagon addresses thousands of vulnerabilities reported by researchers through its bug bounty and vulnerability disclosure initiatives [Read More]
Microsoft releases security advisory on how users can protect themselves against attacks leveraging DDE [Read More]
Hundreds of apps that use Twilio SDK or REST API include hardcoded credentials that can be used to access millions of calls and text messages [Read More]
The recently disclosed crypto flaw affecting Infineon chips takes less time to exploit than initially believed [Read More]
A vulnerability allows hackers to cause some Brother printers to enter a DoS condition. Thousands of devices vulnerable to remote attacks [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Preston Hogue's picture
Working closely with business groups throughout the process of due diligence fulfills the CISO’s responsibilities and creates a more security-savvy business.
Josh Lefkowitz's picture
It’s crucial to recognize that 2018 will very likely be yet another year of increasingly complex and damaging threats and incidents, which is why we must always build upon and further enhance our intelligence strategies.
Oliver Rochford's picture
Compared to the perception that security inhibits productivity and innovation, the reality is bad security has a far greater negative impact.
Josh Lefkowitz's picture
When key decision-makers broaden their mindsets and strategies pertaining to the value and function of intelligence, their organizations can become better positioned to mitigate the cyber and physical risks they face.
Justin Fier's picture
When third-parties are integrated onto the network, threats are bound to slip through the cracks, and the Equifax hack demonstrated how easy it is for a subtle threat to develop into a debilitating data breach.
Josh Lefkowitz's picture
Business Risk Intelligence (BRI) can help inform their decisions, gain a decision advantage over adversaries, and mitigate a broad spectrum of cyber and physical risks.
Lance Cottrell's picture
While mergers and acquisitions (M&A) are generally known for bringing economic growth and opportunity, people are beginning to realize that the process also brings serious cybersecurity risks.
Alastair Paterson's picture
With greater awareness about POS system attacks, operations against third-party suppliers, and the vulnerabilities of public or semi-public Wi-Fi networks, companies can do a lot to mitigate risk and ensure safer journeys for travelers.
Travis Greene's picture
Operating with the assumption that you’ve already been hacked makes security incident response planning a priority for the organization.
Josh Lefkowitz's picture
Oil and gas is one of the critical infrastructure sectors that face greater risks and challenges when it comes to security