Security Experts:

More Security Headlines

Raytheon and Websense discuss the decision to join and form a new company at the RSA Conference.
IBM brings QRadar-powered log management and security intelligence services to the cloud.
New ThreatStream OPTIC Apple Watch app allows security teams to manage threat intelligence on the go.
CipherCloud launches Cloud Discovery Enterprise Edition. The solution provides visibility, risk scoring, and intelligence across cloud applications.
An APT actor dubbed CozyDuke/CozyBear is believed to be behind the recent attacks on the White House and State Department.
The growth of the Internet of Things and the security challenges it poses are among the security topics being discussed at the RSA Conference.
After agreeing to merge in late 2014, Accuvant and FishNet Security said the new combined company will be called Optiv Security.
At the RSA Conference, RSA President Amit Yoran says the security industry must focus on five key things to emerge from the dark ages.
Centrify has launched a new cloud-based identity management solution designed to address the needs of hybrid IT environments of on-premises and cloud-based systems.
US Homeland Security Secretary Jeh Johnson announced that his office is "finalizing plans to open up a satellite office in Silicon Valley, to serve as another point of contact with our friends here."

SecurityWeek Experts

rss icon

Jason Polancich's picture
We seem to be at a watershed moment in both the cybersecurity market and with our business cyber defense circumstances.
Marc Solomon's picture
Just as they’ve embraced other technology innovations to advance their businesses, midsized organizations need a new approach to cybersecurity that mitigates risk to valuable digital assets.
Travis Greene's picture
Just like fumbles and interceptions derail a playbook plan, there are two ways that access certifications today are insufficient.
Avi Chesla's picture
Now more than ever, context-based decisions have become a necessity. This is because the identification process of an advanced persistent attack campaign is all about putting events in the right context.
Marcus Ranum's picture
When you start keeping a long-term data series, remember that you can't change your algorithm for interpreting it on a regular basis.
Joshua Goldfarb's picture
While intelligence is a critical component of a mature security program, it should not drive security. A risk-driven approach provides a much more comprehensive and scientific approach that allows organizations to keep pace with today’s sophisticated threats.
Wade Williamson's picture
By establishing an enterprise-wide context focused on key assets and user behaviors, organizations can build a unified security framework that encompasses all locations and all of their assets.
Rafal Los's picture
As long as the “hikers and bear” analogy is told in boardrooms we will have difficulty communicating the value of a proportionate security model where we design security measures for different types of adversaries with different types of objectives.
Nate Kube's picture
Nate introduces various perspectives on cybersecurity as a moniker, shares some illuminating data, and presents a vernacular to move our field forward.
Torsten George's picture
The NIST Cybersecurity Framework is an important building block, but still just the first step towards implementing operationalized defenses against cyber security risks.