Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The Intelligence and National Security Alliance (INSA) proposes that physical user behavioral analytics should go a step further and incorporate psycho-analytics set against accepted behavior models. [Read More]
Microsoft addresses more than 40 vulnerabilities, including three zero-days exploited in attacks [Read More]
OWASP has proposed two new vulnerability categories for the 2017 update of the OWASP Top 10 [Read More]
The Shadow Brokers have released more NSA exploits, along with a message to US President Donald Trump [Read More]
Hundreds of thousands of IIoT and ICS products could be exposed to attacks due to critical vulnerabilities affecting a widely used CODESYS framework [Read More]
WikiLeaks publishes documents detailing Grasshopper, a platform used by CIA to create Windows malware installers [Read More]
Honeywell has launched a new product designed to protect industrial facilities from USB-borne threats [Read More]
Nearly 1.4 billion data records were compromised in 2016, according to Gemalto’s latest Breach Level Index [Read More]
FBI warns the healthcare industry that threat actors are targeting FTP servers that have anonymous authentication enabled [Read More]
Apple’s initial analysis shows that the iPhone and Mac exploits disclosed by WikiLeaks have already been patched, and the company told WikiLeaks to submit vulnerabilities through the normal process [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Steven Grossman's picture
Without visibility into your information assets, their value, where they live, how they relate to each other and who has access to them, any strategy for protection would be inherently incomplete and ineffective.
Josh Lefkowitz's picture
Digital risk monitoring is a helpful tool for organizations that already have rich intelligence and not just data. Failing to distinguish between the two can be problematic.
Josh Lefkowitz's picture
Executive protection and physical security teams must leverage cyber threat intelligence to gain visibility into all relevant cyber and physical threats and ensure open collaboration and information sharing with all business functions.
Travis Greene's picture
If there are only five controls that a security organization can reasonably tackle this year, what should they be?
Torsten George's picture
Cyber security and cyber threats are most often confused with cyber risk, and often used interchangeably, but they are worlds apart.
Joshua Goldfarb's picture
Risk, reporting, and metrics are three important topics within information security, and they all mean drastically different things to different audiences.
Steven Grossman's picture
When it comes to security and cyber risk, CISOs are in the middle of it all, but they are not alone in protecting the enterprise.
Torsten George's picture
Let’s consider whether the proposed principles and tools by the World Economic Forum (WEF) can improve cyber resilience, and which types of enterprises can benefit most from implementing them.
Erin O’Malley's picture
Today, we expect ultimate convenience. But at what cost? More and more, I’m left wondering whether modern conveniences—grâce à today’s advanced technologies—are truly worth the risk.
Rafal Los's picture
Do you ever find yourself trying to protect your organization from exotic attack scenarios that are highly unlikely or that would have a minimal impact on you?