Security Experts:

Management & Strategy
long dotted


Anomali, a security technology firm that offers a SaaS-based cyber security intelligence platform, today announced it has raised $30 million in series C funding. [Read More]
While companies are getting better at detecting successful network intrusions, attackers are developing new and more professional ways of hiding their presence. [Read More]
FireEye has launched a new service designed to help organizations manage the risks associated with corporate Mergers & Acquisitions (M&A). [Read More]
U.S President Barack Obama announced a new non-partisan commission designed to gather input in order to strengthen cybersecurity in both the public and private sector in the United States. [Read More]
British Telecom (BT) said on Wednesday that it plans to hire 900 people across the globe to work in its cyber security business over the next 12 months. [Read More]
SecurityWeek talked to Symantec's Kevin Haley and asked him to highlight five specific areas of Symantec's Internet Security Threat Report 2016 (ISTR). [Read More]
SecureWorks plans to offer 9 million shares in an upcoming initial public offering (IPO) at a price between $15.50 and $17.50 per share. [Read More]
Recruitment remains a major problem for cyber security departments, and there seems to be no easy solution. [Read More]
A cyber-attack on the website of the Philippines Commission on Elections (Comelec) has resulted in personally identifiable information (PII) of around 55 million people being leaked online. [Read More]
Karamba Security comes out of stealth mode with ECU endpoint solution designed to protect connected cars against cyberattacks [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Scott Simkin's picture
Threat intelligence is only valuable if an organization takes the necessary steps to quickly and easily apply that intelligence to actual security policy.
Adam Meyer's picture
Gaining awareness of supply chain risks and addressing them in the context of broader risk management programs will put organizations in a much better position when it comes to managing their cyber risk.
Alastair Paterson's picture
Failure to secure sensitive information during the M&A process opens the door to threat actors looking to profit by exploiting financial markets and proprietary intellectual property (IP).
Joshua Goldfarb's picture
Cyber insurance, like any tool, will not solve all of an organization’s problems. But it can help an organization round out its risk mitigation strategy.
Bill Sweeney's picture
Enterprises have to worry about the surface area that is open for attack and the challenge of detecting attacks quickly when they are occurring. In every instance simplification will help.
Torsten George's picture
CISOs should pro-actively monitor their company’s risk posture and provide quantitative views of the organization’s risk posture on a semi-annual basis — at the very least.
Jack Danahy's picture
If you keep your focus on how you can remain attractive to those that worry more about keeping the doors open than keeping the network ports closed, you will be more than just one of the million.
Johnnie Konstantas's picture
As NSA Chief Hacker Rob Joyce indicated during his recent talk at the Usenix Enigma conference, hackers are patient and persistent.
Alastair Paterson's picture
The kill chain should flow into a cycle, where an organization can learn lessons from an attack and ensure that future attempts at reconnaissance cannot use the same information, thereby reducing the attack surface.
Travis Greene's picture
It’s been said that the military is always preparing to fight the last war. Are we doing the same in IT security? Are we doomed to always react to the threat?