Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A new report from the United States Government Accountability Office (GAO) shows that the Department of Energy (DOE) has yet to fully analyze the electric grid cybersecurity risks. [Read More]
Microsoft will continue to provide some Windows 7 machines with security updates beyond the January 2020 end-of-support date, and voting systems are among them. [Read More]
FireEye releases SharPersist, a free and open source C#-based Windows persistence toolkit that can be useful to Red Teams. [Read More]
The Libra Association, the organization in charge of Facebook’s Libra cryptocurrency, has launched a public bug bounty program with rewards of up to $10,000. [Read More]
Visa this week announced a new set of capabilities aimed at improving fraud prevention and cybersecurity of payment systems. [Read More]
Facebook has announced the 2019 winners of the Internet Defense Prize, an award offered in partnership with USENIX. [Read More]
U.S. Attorney General Bill Barr says increased encryption of data on phones and computers and encrypted messaging apps are putting American security at risk. [Read More]
BlackBerry Cylance has prepared an update to address a recently disclosed bypass of its AI-based antivirus, but the company has downplayed its impact. [Read More]
The government of Singapore announces its third bug bounty program via HackerOne after the first two were considered a success. [Read More]
AttackIQ, a company that specializes in continuous security validation, raised $17.6 million in a Series B funding round, which brings the total raised by the firm to roughly $35 million. [Read More]

FEATURES, INSIGHTS // Security Architecture

rss icon

Scott Simkin's picture
Threat intelligence can play an important role in improving an organization’s overall cybersecurity posture, provided the right case is made and the right processes are put in place.
Avi Chesla's picture
In today’s market, more does not mean better. We need security innovation that makes more of what the industry already has by turning what we have into what we need.
Lance Cottrell's picture
By focusing on key attack surfaces and architecting systems to maximize the effectiveness of our monitoring efforts we can detect and stop intrusions much more quickly.
Rafal Los's picture
Security frameworks are designed to provide a reference for those designing various programmatic security mechanisms in order to benefit from collective successes and failures of the broad community.
Joshua Goldfarb's picture
Security has evolved to the point that I can now say that collection, sensing, and alerting are yesterday’s news.
Scott Simkin's picture
Threat intelligence is only valuable if an organization takes the necessary steps to quickly and easily apply that intelligence to actual security policy.
Johnnie Konstantas's picture
As NSA Chief Hacker Rob Joyce indicated during his recent talk at the Usenix Enigma conference, hackers are patient and persistent.
Joshua Goldfarb's picture
In security, we have grown accustomed to treating the symptoms of our problems, rather than treating the problems themselves.
Wade Williamson's picture
Data science and machine learning models can assess large groups of cyber threats to find the subtle traits they have in common to better protect organizations.
Tim Layton's picture
While we must continue to use defensive technologies because they help address the level of white noise that has become part of the cost to operate in our hyper-connected, digitized world, we can’t stop there.