Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Vulnerability described as a backdoor patched in Flex System, RackSwitch and BladeCenter switches from Lenovo and IBM [Read More]
Acer, Asus, Dell, Fujitsu, HP, IBM, Lenovo and other device manufacturers start releasing BIOS updates to patch Meltdown and Spectre CPU vulnerabilities [Read More]
High-Tech Bridge improves Trademark Monitoring Radar with new feature designed to identify squatted or fraudulent accounts on social networks and code repositories [Read More]
ICS vendors are assessing the impact of the Meltdown and Spectre vulnerabilities, but extensive testing is needed before any patches can be applied [Read More]
AMD will soon provide optional processor microcode updates designed to mitigate Spectre attacks. Meltdown does not impact the company's CPUs [Read More]
NVIDIA releases updates for GPU display drivers and other products to address the Spectre and Meltdown vulnerabilities [Read More]
IBM starts releasing firmware updates for its POWER processors to address the recently disclosed Meltdown and Spectre vulnerabilities [Read More]
Rockwell Automation patches high severity vulnerability in MicroLogix 1400 controllers. Flaw allows DoS attacks and possibly remote code execution [Read More]
Several vulnerabilities found and patched in some Dell EMC data protection products. Some VMware products are also impacted [Read More]
Qualcomm’s Snapdragon mobile processors are vulnerable to Spectre and Meltdown attacks due to the use of ARM technology [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Steven Grossman's picture
How can a company protect its information and operations without running askew of data privacy laws and the concerns of its customers?
Preston Hogue's picture
No company has the ability to mitigate all risks at all times. No company I’ve ever visited has even had all of its identified risks treated at any given point.
Alastair Paterson's picture
Like a coach, you need to be able to see the big picture with an approach that monitors the entire Internet for risks to your business.
Torsten George's picture
By supplementing traditional perimeter defense mechanisms with data integrity, identity management, and risk-based prioritization principals, organizations can significantly reduce their exposure
Alastair Paterson's picture
Remember that cybercriminals will shift targets and evolve their tactics, techniques and procedures (TTPs) throughout the year.
Steven Grossman's picture
President Ronald Reagan taught us to “trust but verify,” meaning trust is great, but blind trust is dangerous.
Josh Lefkowitz's picture
These tips and best practices will provide insight into some of the key components and processes of a successful usiness Risk Intelligence (BRI) program.
Torsten George's picture
We need to consider whether traditional approaches to vulnerability management are still viable and if just upgrading existing methods or tools is sufficient.
Adam Meyer's picture
It’s that time of year again when we look back at the past year and try to anticipate what we can expect in the coming year. Here is my cybersecurity forecast for 2018.
Preston Hogue's picture
Working closely with business groups throughout the process of due diligence fulfills the CISO’s responsibilities and creates a more security-savvy business.