Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

The Delaware River and Bay Authority (DRBA) published a data security event notice on Friday to warn people who have made purchases at Cape May-Lewes Ferry terminals and vessels that their payment card data might have been compromised.
In an effort to address the global cybersecurity workforce gap, the Information Systems Security Association (ISSA) has launched a professional development framework.
The Federal Trade Commission (FTC), the agency whose goal is to protect America's consumers, has appointed Ashkan Soltani as chief technologist.
Staples said Tuesday it is investigating the possible theft of customer credit card files, a day after a security website reported the likely data breach.
The 2014 ICS Cyber Security Conference will address real world problems and discuss actual ICS cyber incidents, many of which have never been told before.
Researchers have found that the components of the FDT/DTM specification, designed to ease the management of industrial control systems (ICS) contains serious vulnerabilities.
Cybercrime costs are escalating for US companies and attacks are becoming more complicated to resolve, a study showed Wednesday.
Risk I/O has raised an additional $4 million as part of its Series A financing round, and has named Karim Toubba as chief executive officer.
Organization should know four things before going public about a breach: What happened, how it happened, what you are doing to prevent it from happening again, and what you are doing to protect people affected by the incident.
Several sophisticated threat groups have breached the systems of a major critical manufacturing company, the Department of Homeland Security (DHS) revealed in a report.

FEATURES, INSIGHTS // Management & Strategy

rss icon

Jon-Louis Heimerl's picture
You can prioritize your needs when preparing yourself for zombies. When thinking in the world of information security we have the same way of prioritizing. Take the test to see if you are prepared! Tweet Your Score with the hashtag #ZombieSecTest
Joshua Goldfarb's picture
When looking to measure the success and progress of a security program, it is important to think about what success and progress actually mean.
Jason Polancich's picture
Your employees, partners, customers and suppliers are your “survival group” battle-buddies now and it’s important to know how the zombies behave and where they hide.
James McFarlin's picture
A bountiful source of innovative new products for mature security providers lies in the hunting ground of promising newer firms.
Adam Firestone's picture
The imposition of externally-defined cybersecurity methodologies and solutions on both government and critical infrastructure programs hasn’t proven effective. Fortunately, the political and technical winds are shifting
Joshua Goldfarb's picture
As information security professionals, it is tempting to become enamored with the beauty or elegance of a technical solution, analytical technique, or investigative outcome.
James McFarlin's picture
Very little will get a board of directors’ attention as quickly as a cyber data breach with its attendant risks of damage to market capitalization, competitive advantage and brand reputation.
Mark Hatton's picture
Software and hardware alone are not enough to manage a massive enterprise security program. You need security professionals and experienced leaders who can keep the team (and the tools) operating effectively.
Jason Polancich's picture
Las Vegas has created a market-proven, repeatable formula for business success. For enterprises competing each and every day with cybercriminals, what if we were to apply these same principles to enterprise cybersecurity?
Joshua Goldfarb's picture
Proper visibility doesn’t have to mean a deluge of uncoordinated data sources. To security operations and incident response teams, the buzz and hype should be about “big value”, not “big data”.