Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

The NSA has published information on the targeting of Exim mail servers by the Russia-linked threat actor known as Sandworm Team. [Read More]
Google this week announced an expansion for its Vulnerability Rewards Program (VRP) to include critical open-source dependencies of Google Kubernetes Engine (GKE). [Read More]
Crowdsourced security testing provider Synack on Thursday announced that it closed a $52 million Series D funding round, bringing the total raised by the company to $112.1 million. [Read More]
In this CISO Conversations feature, SecurityWeek talks to Mastercard CISO Ron Green, and Ellie Mae CISO Selim Aissi from the finance sector, concentrating on the people problem for CISOs. [Read More]
Democrats abandon vote on the reauthorization of government surveillance programs following opposition from President Trump and the Justice Department. [Read More]
HackerOne says researchers have earned $100 million through its bug bounty platform since 2013. [Read More]
US lawmakers this week will vote on an amendment to the surveillance bill known as the USA FREEDOM Reauthorization Act that would limit law enforcement access to people’s search and browsing histories. [Read More]
More than 40 current and former leaders from around the world have signed a letter asking governments to prevent and stop cyberattacks on healthcare systems amid the COVID-19 pandemic. [Read More]
A security flaw in Qatar's controversial mandatory coronavirus contact tracing app exposed sensitive information of more than one million users, rights group Amnesty International warned. [Read More]
The FTC has approved a settlement with Canadian smart lock maker Tapplock, which allegedly falsely claimed that its devices were designed to be “unbreakable.” [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

John Maddison's picture
By combining ML and AI with a team of advanced cybersecurity professionals to deploy true AI-driven security operations, organizations can stay a step ahead of cybercriminals.
Torsten George's picture
Today’s economic climate exacerbates risks of insider threats, as pending furloughs or pay cuts may tempt employees to exfiltrate data to secure a new job, make up for income losses, etc.
Joshua Goldfarb's picture
Most security organizations realize that, regardless of how much progress they’ve made towards improving maturity and efficiency, there is still more work to be done.
Marc Solomon's picture
With an extensible platform and flexible data model, you can take full advantage of the volume and variety of data to gain insights, and the technologies in your ecosystem to accelerate detection and response and mitigate risk.
Jim Ducharme's picture
Heightened anxiety is a normal consequence of drastic change, and it’s natural for the entire organization to be stressed by the shift to a fully remote work environment.
Preston Hogue's picture
The healthcare industry will need advanced security measures to identify and mitigate flaws in new apps carrying the world’s most sensitive, regulated information.
Marc Solomon's picture
As security professionals, the power of human creativity, sharing and collaboration can help overcome challenges and keep businesses moving forward safely.
Joshua Goldfarb's picture
Even in toxic work environments, the security team must work to minimize risk and defend the organization from information security threats.
Marie Hattar's picture
Organizations should regularly put security products, processes and people to the test, and the reward is better, more efficient protection against attacks.
Marc Solomon's picture
The LEAD threat intelligence framework is a perfect example of the symbiosis between technology and people to strengthen security posture.