Security Experts:

Management & Strategy
long dotted


Not everyone believes it is possible to accurately define and compare costs of data breaches in different companies over time. In recent years both Verizon and ENISA have said it is too difficult. [Read More]
Overall, security defenses have slightly improved, but attacks continue to evolve. Detection is improving. Trustwave says the median time to detect a compromise has decreased from 80.5 days in 2015 to 49 days in 2016. [Read More]
Arbor Networks used IP addresses provided by US-CERT to analyze North Korea’s Hidden Cobra DDoS attacks [Read More]
Over 1 terabytes of data compiled by three Republican Party contractors, including the details of nearly 200 million American voters, exposed online [Read More]
Several vulnerabilities found in HPE SiteScope. No patches available, but users can apply workarounds [Read More]
U.S. fashion retailer Buckle informs customers that malware was present on PoS systems for nearly six months [Read More]
Industry professionals comment on the CrashOverride/Industroyer malware used in the December 2016 Ukraine power grid attack [Read More]
Cambridge, Mass-based Sqrrl -- one of the new breed of threat hunters -- has raised $12.3 million in Series C funding. [Read More]
IAM solutions provider Centrify launches bug bounty program via Bugcrowd with rewards of up to $3,000 per vulnerability [Read More]
Flashpoint's mid-year Business Risk Intelligence Report analyzes data from geopolitics and the deep and dark web to show how threat actors and their motivations have evolved over the first six months of 2017. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Michael Moniz's picture
Your elite cyber defense team needs to actively communicate, pass the bits of evidence around, develop the big picture strategy and be able to adjust to different adversaries.
Adam Meyer's picture
With sound and timely operational threat intelligence, you can make life a lot harder for adversaries and have a much better understanding of how your organization is positioned against today's cyber threats.
Joshua Goldfarb's picture
All the activity around the WannaCry ransomware attack really did make me want to cry. But not for the reasons you might expect. So what was it that nearly brought me to tears?
Steven Grossman's picture
A series of events converged during the past few weeks that reemphasized the need for our industry to do a better job of establishing measurable and repeatable processes.
Marc Solomon's picture
Threat intelligence integration done right will allow you to act on threat intelligence efficiently and effectively using your existing security tools and services.
Torsten George's picture
The healthcare industry has experienced an onslaught of cyber-attacks over the last year, primarily driven by the fact that patient records are highly prized assets among cyber criminals.
Rafal Los's picture
Don’t overlook the importance of having something that’s repeatable. To be repeatable, a process must be well-documented, well-understood and well-practiced.
Joshua Goldfarb's picture
How exactly does reviewing the different markets in the security space bring this famous quote from “Romeo and Juliet” to mind?
Oliver Rochford's picture
Einstein is often quoted as having said that insanity is doing the same thing again and again and expecting a different result. When it comes to cybersecurity, based on that definition, we must all be insane.
Michael Moniz's picture
To be an outstanding cybersecurity professional, you need to think outside of the box, be intellectually curious, self-sufficient and collaborative.