Security Experts:

long dotted


Industry professionals comment on the Meltdown and Spectre attacks exploiting security holes in Intel, AMD and ARM processors [Read More]
An increasing number of companies in the industrial sector reported experiencing a targeted attack, according to a Kaspersky survey of nearly 1,000 organizations [Read More]
Intel has started releasing software and firmware updates to protect devices against Meltdown and Spectre attacks. Updates expected for most CPUs by the end of next week [Read More]
Microsoft, Amazon, ARM, Google, Apple and others have addressed the Meltdown and Spectre vulnerabilities affecting CPUs [Read More]
Devices with Intel, AMD and ARM CPUs are vulnerable to Meltdown and Spectre attacks, which can allow hackers to obtain passwords and other sensitive information [Read More]
A critical vulnerability affecting all Intel CPUs will soon be disclosed. Mitigations can lead to significant performance penalties [Read More]
Trackmageddon - researchers discovered that over 100 online GPS services have vulnerabilities that expose location and other data associated with millions of tracking devices [Read More]
Google warns DoubleClick customers that some of the files provided by third-party vendors through its advertising platform can introduce XSS vulnerabilities [Read More]
Some of the rugged tablets, phones and PDAs made by Pepperl+Fuchs-owned ecom are vulnerable to KRACK attacks [Read More]
vBulletin patches recently disclosed remote code execution and file deletion vulnerabilities [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Josh Lefkowitz's picture
It’s crucial to recognize that 2018 will very likely be yet another year of increasingly complex and damaging threats and incidents, which is why we must always build upon and further enhance our intelligence strategies.
Oliver Rochford's picture
Compared to the perception that security inhibits productivity and innovation, the reality is bad security has a far greater negative impact.
Josh Lefkowitz's picture
When key decision-makers broaden their mindsets and strategies pertaining to the value and function of intelligence, their organizations can become better positioned to mitigate the cyber and physical risks they face.
Justin Fier's picture
When third-parties are integrated onto the network, threats are bound to slip through the cracks, and the Equifax hack demonstrated how easy it is for a subtle threat to develop into a debilitating data breach.
Josh Lefkowitz's picture
Business Risk Intelligence (BRI) can help inform their decisions, gain a decision advantage over adversaries, and mitigate a broad spectrum of cyber and physical risks.
Lance Cottrell's picture
While mergers and acquisitions (M&A) are generally known for bringing economic growth and opportunity, people are beginning to realize that the process also brings serious cybersecurity risks.
Alastair Paterson's picture
With greater awareness about POS system attacks, operations against third-party suppliers, and the vulnerabilities of public or semi-public Wi-Fi networks, companies can do a lot to mitigate risk and ensure safer journeys for travelers.
Travis Greene's picture
Operating with the assumption that you’ve already been hacked makes security incident response planning a priority for the organization.
Josh Lefkowitz's picture
Oil and gas is one of the critical infrastructure sectors that face greater risks and challenges when it comes to security
Josh Lefkowitz's picture
The Deep & Dark Web remains most familiar to cybersecurity and IT teams, but such intelligence can also benefit the mergers and acquisitions (M&A) due diligence process.