Security Experts:

Management & Strategy
long dotted


Former FDIC CIO is accused of covering up several major data breaches, including attacks allegedly conducted by China [Read More]
Healthcare IT security firm Imprivata said on Wednesday that it has agreed to be acquired by an affiliate of private equity giant Thoma Bravo for roughly $544 million in cash. [Read More]
Threat Intelligence and research firm Flashpoint has raised $10 million in Series B funding, and expanded into the Business Risk Intelligence (BRI) market. [Read More]
Microsoft on Thursday announced a shake-up in its top ranks, including the departure of longtime chief operating officer Kevin Turner for a new job. [Read More]
Microsoft has published a paper that proposes a series of recommended 'norms' of good industry behavior in cyberspace, along with proposing a public-private body to attribute severe cyber attacks. [Read More]
The EU will invest €450 million in a new public-private partnership on cybersecurity that is expected to trigger €1.8 billion of investment by 2020. [Read More]
There are two primary security concerns over the 'Brexit'. Firstly that corporate security defenses will be weakened, and secondly that international threat intelligence sharing with Europe will diminish. [Read More]
Carbonite is the latest company hit by a password reuse attack. Password reset emails look phishy [Read More]
GoToMyPC has reset the passwords of all users after what it calls a “very sophisticated password attack” [Read More]
GitHub resets passwords after attackers used leaked credentials to hack accounts [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Ashley Arbuckle's picture
How can security professionals harness cybersecurity to help their organizations take advantage of new opportunities in order to thrive in this digital era?
Ken McAlpine's picture
Once you have an understanding of where your security risks are, you can make better choices about what types and what sources of threat intelligence are most applicable.
Travis Greene's picture
Republicans and Democrats admit that the U.S. government should be doing more to reduce the burden of securing digital business. Perhaps the next president, regardless of which party wins, can find a way to make progress on these wish list items.
Adam Meyer's picture
Threat intelligence is all about reducing uncertainty. A threat intelligence plan should help you define why you are doing what you are doing from an intelligence perspective.
Alastair Paterson's picture
It's important to look at your environment through the eyes of an attacker to detect the threats and vulnerabilities relevant to your organization.
Torsten George's picture
Vulnerability assessments are often confused with penetration tests. In fact, the two terms are often used interchangeably, but they are worlds apart.
Joshua Goldfarb's picture
You’ll never see someone who solved their alert fatigue issues and runs an efficient security operations program on the six o’clock news. Hacking is sexy, but defending is an important piece of the security puzzle.
Ashley Arbuckle's picture
C-suite leaders should be thinking about cybersecurity as a strategic advantage that can set them apart from competitors.
Eddie Garcia's picture
One of the best use cases for big data is to use Hadoop for log ingestion and security analytics. Through audit, we can ensure that the security controls that are in place are working correctly and identify attempts to circumvent them.
Jennifer Blatnik's picture
It's been a dirty little secret among those of us in the security industry that there are two types of security solution providers...