As the head of DevSecOps at Intuit, Shannon Lietz tracks the real-world tactics, techniques and procedures hackers use against her organization. She's cataloged the top 10 application security attack techniques being used against Intuit, which differ markedly from the OWASP top 10.
Hacking is a global phenomenon, says Liv Rowley, an intelligence analyst at Flashpoint who's been tracking the rise, fall and mysterious reappearance of Cebolla Chan 3.0, the Latin American region's top Spanish language hacking forum.
The latest iteration of the NIST Cybersecurity Framework is designed to help bring those who aren't experts into the cybersecurity conversation, says Matthew Barrett of the National Institute of Standards and Technology. He outlines the expanded scope in version 1.1
What are the top cybersecurity threats and trends on security experts' radar? McAfee's Raj Samani and Steve Povolny discuss Olympic Destroyer malware, cryptocurrency mining, the Cambridge Analytica and Facebook scandal and more.
What two points do GDPR and other new regulations have in common? They put pressure on organizations to demonstrate strong security postures and mitigate third-party risk. Danny Rogers of Terbium Labs discusses how security leaders can respond.