Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The UK government has published its fourth annual breaches survey: the Cyber Security Breaches Survey 2019. [Read More]
A survey conducted by Ponemon and Tenable reveals that 90% of organizations that have OT infrastructure experienced at least one damaging cyberattack in the past two years. [Read More]
Canada's foreign minister warned Friday that outside interference in the country's upcoming parliamentary election was "very likely". [Read More]
Unofficial patches have been released by 0patch for two unfixed Oracle Java RE vulnerabilities discovered by a Google Project Zero researcher. [Read More]
Some of the top research universities in the US are cutting ties with Chinese tech giant Huawei as the company faces allegations of bank fraud and trade theft. [Read More]
Microsoft does not seem concerned about the unpatched Internet Explorer and Edge vulnerabilities for which PoC exploits were recently made public. [Read More]
Two companies exposed more than 540 million records containing information on Facebook users and their activities via unprotected AWS S3 buckets. [Read More]
A study conducted by Trend Micro shows that the manufacturing industry is exposed to a wide range of threats, in many cases due to long equipment life cycles. [Read More]
A Chinese woman carrying a device containing computer malware lied to Secret Service agents and briefly gained admission to President Donald Trump’s Mar-a-Lago club over the weekend during his Florida visit. [Read More]
Shodan announces Monitor, a new service designed to help organizations keep track of systems connected to the Internet. [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Josh Lefkowitz's picture
It can be difficult for teams to determine how to obtain and incorporate data from encrypted chat service platforms into their collection strategies in a meaningful way.
Alastair Paterson's picture
While no digital risk framework is perfect, the optimal level of maturity will look to continually identify gaps, update processes and tooling, and reflect organizational changes.
Josh Lefkowitz's picture
The best way for intelligence practitioners to identify what types of context their intelligence consumers truly need is simply to ask them.
Alastair Paterson's picture
By understanding where assets are exposed, their value to attackers, and how attackers target this data, organizations can make better decisions about their defenses and improve them over time.
Josh Lefkowitz's picture
Josh Lefkowitz shares—and debunks—some of the most persistent and misleading BRI fallacies he has heard over the years.
Alastair Paterson's picture
Organizations’ perimeters will continue to erode as their digital footprints expand, but with the right risk protection strategy any organization can succeed in the age of digital transformation.
Grady Summers's picture
Companies in China are facing many of the same threats that your organization faces today, but they are addressing these threats at a massive scale, on emerging platforms, and with innovative approaches that we can learn from.
Marc Solomon's picture
The ability to customize threat intelligence scores allows you to prioritize threats to your organization and reevaluate and reprioritize as new data and context becomes available.
Joshua Goldfarb's picture
In some instances, it is precisely because we are so familiar and comfortable with something that makes us incapable of seeing that there is a better way.
Josh Lefkowitz's picture
A business risk intelligence (BRI) program needs to understand and account for the different categories of risk faced by all business functions across an enterprise.