Security Experts:

Management & Strategy
long dotted


Cisco has agreed to acquire privately held, UK-based Portcullis, a consultancy that provides cybersecurity services to enterprise and government sector clients.
Raytheon has been awarded a new cybersecurity contract with the Department of Homeland Security (DHS) that could be worth approximately $1 billion.
Airbus Defence and Space has struck a strategic partnership with French IT service company Atos to develop security systems against computer attacks.
Splunk released Splunk Enterprise Security 4.0 (formerly Splunk App for Enterprise Security) and Splunk User Behavior Analytics (UBA) security solutions.
Seculert has appointed Richard Greene as its new Chief Executive Officer, replacing Co-Founder Dudi Matot, who will remain with the company as President.
Red Hat warned users on Thursday that it detected an intrusion on two websites related to Ceph, the company’s open source distributed storage platform.
Microsoft signed a Government Security Program (GSP) agreement with the NATO Communications and Information Agency (NCI Agency), a new step in a 12-year cybersecurity relationship between the two.
John McAfee, a software pioneer who later became a fugitive from justice in Central America, unveiled plans Wednesday to run for the US presidency.
Microsoft has acquired Adallom, an Israeli security startup that helps organizations protect data in cloud applications.
Systems and security management company Tanium has raised an additional $120 million in funding from a handful of investors, bringing the total raised by the software maker to $262 million.

FEATURES, INSIGHTS // Management & Strategy

rss icon

Scott Simkin's picture
When vendors and individuals attempt to keep threat intelligence private, they limit the ability of the entire group to identify and mitigate new threats as they are developed and launched against organizations.
Joshua Goldfarb's picture
Let’s face it. Most people in the world in which we live are not very security literate. To learn security lessons from the “unwashed masses”, we must first understand what security means to them.
Rafal Los's picture
It’s your job to understand your limitations on the understanding of risk and to responsibly formulate defensible calculations that drive your tactics and strategy. Using “probability” as a metric is not only black magic, but it’s going to give you the wrong answer.
Wade Williamson's picture
For CISOs and security directors, recruiting and retaining talent for their security teams is more challenging than keeping pace with technology.
Jason Polancich's picture
Even some of the most “well-to-do” of companies often skimp on cyber defense or simply don’t prioritize it sufficiently.
Torsten George's picture
IoT opens up companies all over the world to more security threats, and only time will tell if the IoT vendor community can come together to create a common security framework that helps shrink the security risk iceberg and minimize the risk of cyber-attacks.
Marc Solomon's picture
The global cybersecurity skills shortage isn’t going away any time soon. But by attacking it on multiple fronts we can proactively work to address it
Alan Cohen's picture
Insecurity of any time stems from a common psychological cause -- fear. Fear is generally a reaction to something immediate that threatens your security or safety. Fear itself can harm one’s judgment and prevent teams from taking action.
Joshua Goldfarb's picture
Rather than proceed step by step through the process of building and maturing a security operations function, security teams often want to move immediately into very advanced topics.
Travis Greene's picture
In the case of Hilary Clinton's personal email server, we know that Top Secret information was transmitted over a network that likely wasn’t equipped to safeguard it. If her server was a target of foreign state actors, the implications are frightening.