Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Financially motivated attackers have become just as sophisticated as state-sponsored actors, says FireEye in 2017 M-Trends report [Read More]
RCE vulnerability in Apache Struts 2 affects several VMware products, including vCenter, DaaS, vROps and Hyperic [Read More]
Researchers discovered several vulnerabilities in Double telepresence robots. Flaws patched with server-side fix [Read More]
Several Cisco products are exposed to attacks due to the Apache Struts 2 vulnerability that has been exploited in the wild [Read More]
Israel-based cybersecurity startup Cymulate announced on Friday that it has raised $3 million through a Series A round of financing led by Susquehanna Growth Equity. [Read More]
Industry professionals comment on the CIA hacking tools detailed by WikiLeaks and the implications of the Vault7 leak [Read More]
WikiLeaks will share details on the CIA hacking tools with tech companies, but the White House says there may be legal repercussions [Read More]
CIA responds to WikiLeaks Vault 7 dump: it’s our job to be innovative and cutting-edge, but we don’t spy on fellow Americans [Read More]
Apple and Google are confident that most of the vulnerabilities used by the CIA do not affect the latest versions of their products [Read More]
Researchers found several potentially serious flaws in a popular pricing software from Navetti. Patches are available [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Marc Solomon's picture
There are strategies you can use so that the risk score is more relevant and useful within your specific environment.
Torsten George's picture
Let’s consider whether the proposed principles and tools by the World Economic Forum (WEF) can improve cyber resilience, and which types of enterprises can benefit most from implementing them.
Joshua Goldfarb's picture
Let’s take a look at the essential functions required to bring a mature security operations and incident response capability to the masses via a unified security operations platform.
Avi Chesla's picture
Correlating data points through more holistic analytic systems can help reveal the bigger picture and understand the real intent of an attack campaign.
Lance Cottrell's picture
Whether in a bar or in public, on the dark-web or a major news site, the lesson my Kung Fu instructor taught me on that first day can go a long way to keeping you safe.
Rafal Los's picture
When you’re solving problems it’s easy to get lost in creating something complicated. I believe that the more difficult path is to simplify, simplify, simplify.
Steven Grossman's picture
While we all dream of solving the skills shortage by completely automating the entire detection and response process, it is simply unlikely to happen in the foreseeable future.
Erin O’Malley's picture
Today, we expect ultimate convenience. But at what cost? More and more, I’m left wondering whether modern conveniences—grâce à today’s advanced technologies—are truly worth the risk.
Rafal Los's picture
Do you ever find yourself trying to protect your organization from exotic attack scenarios that are highly unlikely or that would have a minimal impact on you?
Scott Simkin's picture
Threat intelligence can play an important role in improving an organization’s overall cybersecurity posture, provided the right case is made and the right processes are put in place.