Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Area 1 Security has raised $8 million in a Series A funding round led by Ted Schlein at Kleiner Perkins Caufield & Byers (KPCB).
Belden Inc. announced on Tuesday that it has signed a definitive agreement to acquire Tripwire, a provider of IT security and compliance solutions, for $710 million in cash.
New survey from Trustwave found more than one-fifth of respondents said their organization had no incident response plan in place.
Security industry experts provide reactions and insights into the damaging cyber attack against Sony that occurred in November 2014.
Cyber risk assessment and data breach services company NetDiligence published a new study focusing on the costs incurred by insurance underwriters due to cyber incidents.
According to a study conducted by EMC, enterprises employing more than 250 people lost a total of $1.7 trillion in the past year due to downtime and data loss.
The European Union Agency for Network and Information Security (ENISA) has published a framework designed to help government officials and policy practitioners evaluate National Cyber Security Strategies (NCSS).
Intel has acquired PasswordBox, a Montreal-based identity management service that enables users to log into websites and applications without having to type or remember passwords.
While Home Depot and Staples say cyber liability insurance will mitigate the financial impact of data breaches they suffered, adoption of cyber insurance generally appears to be mixed.
Security intelligence and analytics solutions provider Endgame, Inc. announced that it has closed a $30 million Series C equity funding round.

FEATURES, INSIGHTS // Management & Strategy

rss icon

Adam Firestone's picture
Security requirements for information assurance, risk management, and certification and accreditation constrain Government organizations with respect to software allowed on Government networks.
Joshua Goldfarb's picture
In resource-limited environments, every alert counts. Spear alerting is an approach that can help organizations improve their signal-to-noise ratio and make their security programs much more efficient and effective.
Jason Polancich's picture
Starting your own private ISAC is easier and more important long-term than you might think.
James McFarlin's picture
What key forces are driving the demand for cyber insurance and how can such coverage best fit into an overall cybersecurity strategy?
Joshua Goldfarb's picture
Is budget a good metric for security? In other words, if an organization wishes to improve its security posture, is spending more money an appropriate response?
James McFarlin's picture
Was the plan by the Securities Industry and Financial Markets Association (SIFMA) to create a new inter-agency working group comprised of data security regulators a reaction to the recent acceleration of nationwide data breaches?
Marc Solomon's picture
While we can’t address security without technology, we also need to consider education. Organizations must also be committed to keeping their IT security staff highly trained on the current threat landscape and advanced approaches to security.
Nate Kube's picture
I would like the OT security community to move away from asking what can we do to gain greater adoption of a greenfield IT security model and instead ask how we can gain demonstrable gains in OT security posture more efficiently.
Joshua Goldfarb's picture
Because of the large volume of even the highest priority alerts, analysts are not able to successfully review each event. And with a large number of false positives, analysts become desensitized to alerts and do not take them seriously.
Jason Polancich's picture
Sharing threat information, analysis and expertise within your “extended family” can be very valuable to establishing the kind of early warning system that is the promise of cyber information sharing to begin with - and without most of the risks.