Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Federal Communications Commission (FCC) Chairwoman Jessica Rosenworcel proposes strengthening rules around telecom providers’ reporting of data breaches. [Read More]
Mozilla fixes multiple high-severity vulnerabilities with the release of Firefox 96, Firefox ESR 91.5, and Thunderbird 91.5. [Read More]
CISA, FBI and NSA have released a joint cybersecurity advisory providing an overview of cyber operations linked to the Russian government. [Read More]
Researchers have analyzed 16 URL parsing libraries and showed how inconsistencies can lead to various types of vulnerabilities. [Read More]
The U.S. government has issued a warning over the use of commercial surveillance tools and it has shared some recommendations. [Read More]
Recorded Future snaps up SecurityTrails for a direct entry into the booming attack surface management business. [Read More]
The FTC has warned companies that they face legal action if exploitation of the Log4Shell vulnerability leads to customer harm. [Read More]
Cyber insurance firm Corvus has expanded its international footprint with the acquisition of UK-based cyber underwriting platform Tarian from Beat Capital Partners. [Read More]
The SecurityWeek editorial team looks into their crystal balls and make some bold predictions about the big cybersecurity stories that will dominate the headlines in 2022. [Read More]
Booz Allen Hamilton has analyzed the quantum computing arms race to determine China’s current and future capabilities, and to understand the likely use of China’s cyber capabilities within that race. [Read More]

FEATURES, INSIGHTS // Risk Management

rss icon

Keith Ibarguen's picture
Far too many engineers in the trenches don’t take the time to lift their heads to see context, so when good (and bad) things happen, this is a great management opportunity that you should take full advantage of.
Landon Winkelvoss's picture
Security and intelligence teams often lack finished intelligence, which leaves them ill-equipped to combat motivated and sophisticated adversaries.
William Lin's picture
After every company goes through digital transformation, their threat model will change in response.
Derek Manky's picture
As we see an increasing number of recent attacks against critical infrastructure – cybersecurity and physical security can be intrinsically linked.
Rob Fry's picture
We are a community with grand ideas around the concept of crowdsourced threat intel (CTI), but with little history or previous successes that show CTI as a viable idea.
Landon Winkelvoss's picture
Executive protection teams face threats from many sources including social media, telephone, email, and event in-person physical threats.
Landon Winkelvoss's picture
Ineffective security approaches when integrating two separate organizations can lead to significant issues that could undercut the business value of a merger or acquisition.
Landon Winkelvoss's picture
While cyber due diligence has yet to become commonplace in M&A transactions, the consequences of failing to identify risks and active campaigns can have costly implications.
Gunter Ollmann's picture
In the merry-go-round world of InfoSec technologies and “what’s old is new again,” this year we should include Attack Surface Management with a dash of Continuous.
Laurence Pitt's picture
School network administrators should be taking precautions to prepare for the new challenges of the upcoming academic year.