Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

JPMorgan Chase, one of the largest banks in the United States, has confirmed that its systems were breached this summer.
The 2014 ICS Cyber Security Conference will address real world problems and discuss actual ICS cyber incidents, many of which have never been told before.
Freenode is asking users to change their passwords after some servers have been compromised by an unknown third party.
Veracode has closed a late-stage $40 million funding round led by Wellington Management with participation from previous investors.
Remote connectivity services provider LogMeIn announced the acquisition of Meldium, a startup that specializes in cloud-based single-sign-on (SSO), password management, and identity and access management (IAM) solutions.
Japan's security-conscious government admitted that details about the flight path and exact location of the prime minister's plane had been posted on the Internet for anyone to see.
The first European edition of Suits and Spooks, the cyber security conference that brings together decision makers and influential thought leaders in the industry, will be held in London on September 12. Register now and hold your spot!
Goodwill Industries revealed that some of its customers' payment cards were compromised after the systems of a third-party vendor became infected with malware.
BeyondTrust, a provider of Privileged Account Management and Vulnerability Management solutions, has agreed to be acquired by private equity firm, Veritas Capital.
Federal authorities in the United States are investigating reports of cyberattacks launched against JPMorgan Chase and at least one other unnamed financial institution.

FEATURES, INSIGHTS // Management & Strategy

rss icon

Marcus Ranum's picture
A few years ago, there was a bit of discussion about improving security. A number of researchers' systems and faculty systems had been compromised, and “something must be done” - but what?
James McFarlin's picture
With risks to national and economic security increasing, other avenues of cyber defense are receiving attention. Improving resilience and the promising application of predictive analysis to the prevention of cyberattacks before they occur are two such areas
Rebecca Lawson's picture
There is a common misconception that in order to move to virtual security solutions, companies can, or should, replace physical security technologies they rely on to keep their networks safe today.
Mark Hatton's picture
it’s hard to build continuity under inconsistent leadership. It’s also really hard to beat the hackers when the person responsible for keeping them at bay has less job security than an NFL coach with a losing record.
Jason Polancich's picture
Collecting just a small amount of info regularly and diligently for your supply chain can not only help you secure your back doors, but the front entrances too.
Marc Solomon's picture
With the right information, security professionals can quickly pivot from detection to a full understanding of the scope of the outbreak and take action to head off wider compromises
Torsten George's picture
A risk-driven approach addresses both security posture and business impact to increase operational efficiency, improve assessment accuracy, reduce attack surfaces, and improve investment decision-making.
Joshua Goldfarb's picture
Getting to the root cause involves a level of understanding beyond that of simply identifying that a system in infected. We need to understand what specifically enabled or facilitated the infection.
Travis Greene's picture
The significant breaches of today are executed by people infiltrating the organization, and attackers are doing this by assuming identities or abusing insider privileges.
James McFarlin's picture
Launched in 2009, CyberPatriot began with eight high school cybersecurity teams competing for scholarships. In just six years, participation quickly expanded to more than 1500 teams around the world.