Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Analysis of 60,000 breaches over the last three years provides extensive data on where things are going wrong, and highlights trends on what is likely in the future. [Read More]
A survey commissioned by Ivanti shows that a majority of CISOs in Europe have shifted the focus of their cybersecurity strategy to mobile devices due to increasing remote work. [Read More]
Google says it’s making progress on plans to revamp Chrome user tracking technology aimed at improving privacy even as it faces challenges from regulators and officials. [Read More]
In this installment of SecurityWeek’s CISO Conversations series, we talk to two veteran security leaders in the technology sector: Brent Conran, CISO at Intel, and Chris Leach, Senior CISO Advisor at Cisco Systems. [Read More]
The elite Russian hackers who gained access to computer systems of federal agencies last year didn’t bother trying to break one by one into the networks of each department. [Read More]
With Microsoft Edge 88.0.705.50, users get a built-in strong password generator that allows them to easily set up new passwords when signing up for new accounts or when changing the old passwords. [Read More]
Unprotected Windows RDP servers have been abused to amplify DDoS attacks, with observed attacks ranging between 20 and 750 Gbps. [Read More]
Microsoft has released another report detailing the tactics, techniques and procedures of the SolarWinds hackers. [Read More]
The multi-stage, tag-based malicious ad campaign is heavily obfuscated and employs clever tricks to avoid detection. [Read More]
DNSpooq is the name given to 7 Dnsmasq vulnerabilities that could expose millions of devices to DNS cache poisoning, remote code execution and DoS attacks. [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

John Maddison's picture
By understanding the latest threat trends, security teams can take measures to ensure that their security strategies, including the identification and tracking of new IOCs, are being correctly updated.
Matt Morris's picture
Companies must instill a culture of resilience in which security improvements are emphasized as a fundamental component of an organization’s individual corporate culture
Preston Hogue's picture
From a cybersecurity perspective, perhaps the greatest risk for digital education comes from the wide variation across districts in terms of resources.
Alastair Paterson's picture
Opportunities for accidental exposure of sensitive information are often compounded by multiple stakeholders using collaborative tools without the proper policies, oversight and security training.
AJ Nash's picture
Intelligence is one of a few vital security concepts that industries are increasing their investments in as they recognize the documented value of proactive security.
Marc Solomon's picture
Phil Jones who, who has overseen Operations within Airbus Cybersecurity since 2016, discusses some of the key takeaways from the current crisis.
Joshua Goldfarb's picture
Some security start-ups bring much needed creative thinking and new ideas to a challenging field. Others don’t bring much of anything to the table, and in some cases, can actually harm an organization’s security posture.
Gunter Ollmann's picture
As SecOps teams increasingly take on proactive risk reduction, their vocabulary expands from security threats to include posture lapses, and posture fatigue will grow.
Idan Aharoni's picture
The threat intelligence space is filled with great vendors who can provide organizations with a lot of value in helping them protect their brand, employees and customers.
Jim Ducharme's picture
Heightened anxiety is a normal consequence of drastic change, and it’s natural for the entire organization to be stressed by the shift to a fully remote work environment.