Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Twitter has informed customers that a vulnerability in its Android app could have been exploited by malicious applications to access direct messages and other private data. [Read More]
Lafayette, Colorado, officials announced Tuesday the city’s computer systems were hacked and they were forced to pay a ransom to regain access. [Read More]
State and local officials are receiving additional tools from the federal government to help defend the nation’s election systems from cyberthreats ahead of the November vote. [Read More]
The U.S. government has attributed a piece of malware named Taidoor, which has been around for more than a decade, to threat actors sponsored by the Chinese government. [Read More]
Google Project Zero has released a report on the zero-day vulnerabilities exploited in attacks in 2019. [Read More]
As the Nov. 3 presidential vote nears, there are fresh signs that the nation’s electoral system is again under attack from foreign adversaries. [Read More]
Microsoft will continue talks to acquire the US operations of popular video-sharing app TikTok, after meeting with President Donald Trump who seemingly backed off his earlier threats to ban the Chinese-owned platform. [Read More]
The patches released by Linux distributions for the GRUB2 vulnerability dubbed BootHole (CVE-2020-10713) are causing many systems to become unbootable. [Read More]
Email and data security provider Mimecast on Thursday announced the acquisition of messaging security company MessageControl. [Read More]
Twitter on Thursday revealed that several employees were targeted with phone spear-phishing in a social engineering attack leading to the recent security incident. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Marc Solomon's picture
Most organizations have a complex security infrastructure that consists of multiple products from multiple vendors to create layers of defense.
Preston Hogue's picture
From a cybersecurity perspective, perhaps the greatest risk for digital education comes from the wide variation across districts in terms of resources.
Laurence Pitt's picture
Cybersecurity innovation is not quite at the stage where it needs resuscitation, still, the last few months have demonstrated the need for change.
Alastair Paterson's picture
Opportunities for accidental exposure of sensitive information are often compounded by multiple stakeholders using collaborative tools without the proper policies, oversight and security training.
AJ Nash's picture
Intelligence is one of a few vital security concepts that industries are increasing their investments in as they recognize the documented value of proactive security.
Marc Solomon's picture
Phil Jones who, who has overseen Operations within Airbus Cybersecurity since 2016, discusses some of the key takeaways from the current crisis.
Joshua Goldfarb's picture
Some security start-ups bring much needed creative thinking and new ideas to a challenging field. Others don’t bring much of anything to the table, and in some cases, can actually harm an organization’s security posture.
Gunter Ollmann's picture
As SecOps teams increasingly take on proactive risk reduction, their vocabulary expands from security threats to include posture lapses, and posture fatigue will grow.
Idan Aharoni's picture
The threat intelligence space is filled with great vendors who can provide organizations with a lot of value in helping them protect their brand, employees and customers.
Laurence Pitt's picture
To minimize the effect of an attack, an automated response is vital, which can reduce the amount of time between infection and resolution.