Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

The wormable Windows RDS vulnerability patched recently by Microsoft (CVE-2019-0708), including in Windows XP and Server 2003, poses a serious risk to industrial environments. [Read More]
Stack Overflow, the popular Q&A platform for programmers, said hackers gained access to production systems over the weekend. [Read More]
Facebook has partially restored the View As feature abused by hackers last year in a massive data breach that affected 29 million accounts. [Read More]
Google is offering to replace Bluetooth Titan Security Keys for free after researchers at Microsoft discovered a misconfiguration that can be exploited to attack the devices. [Read More]
Respond Software, a California-based company that provides automation technology for security teams, raises $20 million in a Series B funding round. [Read More]
New Intel CPU vulnerabilities known as MDS, ZombieLoad, Fallout and RIDL impact millions of devices. Affected vendors published advisories and blog posts with information for users. [Read More]
ZombieLoad, RIDL and Fallout: Intel processors are vulnerable to more speculative execution side-channel attacks that can allow malware to obtain sensitive data. [Read More]
Boost Mobile has warned an unspecified number of customers about unauthorized online account activity on March 14, 2019. [Read More]
A recently introduced bill, the Congressional Cybersecurity Training Resolution of 2019, requires all U.S. House members to undergo annual cybersecurity training. [Read More]
Symantec has appointed board member Rick Hill as interim president and CEO after Greg Clark has stepped down. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Gunter Ollmann's picture
CISOs should invest time in applying the resources of public cloud to bring automation, scalability, and AI to solving the given problem as a platform for all customers – past, present, and future.
Justin Fier's picture
As innovative attacks continue to expand the purview of cyber security, helping CISOs means equipping them with equally innovative tools that stand a fighting chance.
Joshua Goldfarb's picture
In addition to crossword puzzles being fun, they can also help us learn a number of different information security lessons.
Devon Kerr's picture
Organizations should plan beyond initial compromise and invest in technologies, personnel and methods that foster a more complete understanding.
Marc Solomon's picture
With a platform that can act as a virtual cybersecurity situation room, teams and team members can share the same pool of threat data and evidence to conduct investigations collaboratively.
Stan Engelbrecht's picture
Security teams should always be on the lookout for ways to become more proactive by predicting and anticipating their adversaries’ next moves
Torsten George's picture
Shifting traditional perimeter-based enterprise security strategies to a Zero Trust approach provides more robust prevention, detection, and incident response capabilities to protect continuously expanding attack surfaces.
Joshua Goldfarb's picture
There are certainly no shortcuts and no easy fixes for retaining top security talent. While the list of recommendations on this topic is lengthy, showing security talent that it is respected is high on that list.
Marc Solomon's picture
Like the teams that progress through to the NCAA National Championship, you’ve now pared down “the threat landscape” to “your threat landscape” and set yourself up for success.
Gunter Ollmann's picture
As malware writers harness AI for cybercrime, the security industry must push forward with a new generation of dissection and detonation technologies to prepare for this coming wave.