Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Risk I/O has raised an additional $4 million as part of its Series A financing round, and has named Karim Toubba as chief executive officer.
Organization should know four things before going public about a breach: What happened, how it happened, what you are doing to prevent it from happening again, and what you are doing to protect people affected by the incident.
Several sophisticated threat groups have breached the systems of a major critical manufacturing company, the Department of Homeland Security (DHS) revealed in a report.
A new report from (ISC)2 and the University of Phoenix sheds light on the challenges of closing the cyber-security workforce gap and offers recommendations to businesses, students and employers.
Several US financial institutions were targeted by the same computer hackers who breached the systems of JPMorgan Chase earlier this year, sources familiar with the matter said Wednesday.
Welcome to the Interactive Agenda for the 2014 ICS Cyber Security Conference! After a sell-out conference in 2013, be sure to Register Now and confirm your spot for this year’s event!
Data belonging to customer of MBIA Inc., the largest bond insurer in the United States, was inadvertently made available online due to a misconfigured Web server.
Sophos has acquired Mojave Networks, a cloud-based security solutions provider based in San Mateo, California.
Yahoo! CISO Alex Stamos said that three Yahoo Sports API servers had malicious code executed on them recently by attackers looking for vulnerable Shellshock server.
In a two-year study of information about critical control systems directly connected to the Internet, researchers found mining equipment, a surprising number of wind farms, a crematorium, water utilities, and several substations.

FEATURES, INSIGHTS // Management & Strategy

rss icon

Adam Firestone's picture
The imposition of externally-defined cybersecurity methodologies and solutions on both government and critical infrastructure programs hasn’t proven effective. Fortunately, the political and technical winds are shifting
Joshua Goldfarb's picture
As information security professionals, it is tempting to become enamored with the beauty or elegance of a technical solution, analytical technique, or investigative outcome.
James McFarlin's picture
Very little will get a board of directors’ attention as quickly as a cyber data breach with its attendant risks of damage to market capitalization, competitive advantage and brand reputation.
Mark Hatton's picture
Software and hardware alone are not enough to manage a massive enterprise security program. You need security professionals and experienced leaders who can keep the team (and the tools) operating effectively.
Jason Polancich's picture
Las Vegas has created a market-proven, repeatable formula for business success. For enterprises competing each and every day with cybercriminals, what if we were to apply these same principles to enterprise cybersecurity?
Joshua Goldfarb's picture
Proper visibility doesn’t have to mean a deluge of uncoordinated data sources. To security operations and incident response teams, the buzz and hype should be about “big value”, not “big data”.
Marcus Ranum's picture
A few years ago, there was a bit of discussion about improving security. A number of researchers' systems and faculty systems had been compromised, and “something must be done” - but what?
James McFarlin's picture
With risks to national and economic security increasing, other avenues of cyber defense are receiving attention. Improving resilience and the promising application of predictive analysis to the prevention of cyberattacks before they occur are two such areas
Rebecca Lawson's picture
There is a common misconception that in order to move to virtual security solutions, companies can, or should, replace physical security technologies they rely on to keep their networks safe today.
Mark Hatton's picture
it’s hard to build continuity under inconsistent leadership. It’s also really hard to beat the hackers when the person responsible for keeping them at bay has less job security than an NFL coach with a losing record.