Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

FireEye has released an open source tool that checks Microsoft 365 tenants for the use of techniques associated with the SolarWinds hackers. [Read More]
The funds will help Rewind continue expanding its backup-as-a-service (BaaS) offering for more business-critical applications. [Read More]
The OpenWrt Project said someone breached its forum over the weekend and downloaded user information. [Read More]
Going after high profile victims appears to have allowed Ryuk ransomware operators to build a highly lucrative malware enterprise. [Read More]
WhatsApp on Friday postponed a data-sharing change as users concerned about privacy fled the Facebook-owned messaging service and flocked to rivals Telegram and Signal. [Read More]
Rob Joyce, an official who is highly respected in the cybersecurity community, has been named the NSA’s new director of cybersecurity. [Read More]
The Canadian data security startup closes a Series A funding round to expand its data discovery and classification offerings. [Read More]
To patch the Netlogon protocol, a February 9 security update will enable a Domain Controller enforcement mode. [Read More]
The company sued two individuals for using browser extensions to scrape user profiles and other information from its website. [Read More]
The NSA issues guidance on the use of DNS over HTTPS (DoH), which encrypts DNS requests to improve privacy. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

AJ Nash's picture
For companies trying to build new or mature existing intelligence programs, the Age of COVID has been an excellent time to capture 30-60 minutes with that hard-to-find manager
Marc Solomon's picture
To push security operations forward, we must move towards a single, collaborative environment that can include threat hunters, incident handlers and threat intelligence and SOC analysts.
Torsten George's picture
While the SolarWinds hack is not the first supply chain attack to make headlines, its sophistication and blast radius is forcing organizations to consider how they can minimize their exposure to these types of threats in the future.
AJ Nash's picture
As you build your cyber intelligence program – and have all the vendors lined up to take your money – don’t overlook the importance of investing in the right people.
Laurence Pitt's picture
Many security teams will have to reduce budget against projects scheduled for 2021, with funds being re-allocated to pandemic-related business and workforce enablement
Marc Solomon's picture
Curated threat intelligence is an essential capability of the SOC, enabling tools and teams to work more efficiently and effectively to optimize everything from incident response to threat hunting.
Derek Manky's picture
With the pandemic creating a massive remote work shift and consequent rises in cyber risk, finding individuals with cybersecurity skills is harder than ever.
Tim Bandos's picture
Keeping a ‘six foot distance’ between our digital home life and digital work life can go a long way when it comes to safeguarding our most sensitive data, too.
AJ Nash's picture
Knowing that threat intelligence is readily available and proving its worth is one thing, understanding how to use it within your security operations program is quite another.
Marc Solomon's picture
When intelligence becomes a capability and not just subscriptions to feeds, we can gain the full value of intelligence as the foundation to security operations.