Security Experts:

Management & Strategy
long dotted


Rudi Giuliani could prove a good selection as a cyber security advisor to Donald Trump if his role is primarily as an informal executive meeting facilitator. [Read More]
Hacker claims to have stolen 900 Gb of data from Israeli mobile forensics company Cellebrite [Read More]
GoDaddy has revoked nearly 9,000 certificates after discovering a bug that caused the domain validation process to fail [Read More]
Trend Micro's Zero Day Initiative (ZDI) paid out nearly $2 million in 2016 for vulnerabilities [Read More]
E-Sports Entertainment Association (ESEA) has become the latest games entertainment company to suffer -- with systems breached in 2016, and user credentials spilled in January 2017. [Read More]
Phantom, a cybersecurity startup that has developed a community-powered security automation and orchestration platform, has raised $13.5 million in a Series B funding round led by iconic Silicon Valley VC firm Kleiner Perkins. [Read More]
Fortinet has hired former NSA Cyber Task Force Chief Phil Quade as Chief Information Security Officer (CISO). [Read More]
The California Department of Insurance said that an investigation into the data breach of health insurance giant Anthem has concluded that a foreign country was behind the attack. [Read More]
St. Jude Medical has patched some of the vulnerabilities found by MedSec, but the vendor insists the risk of cyberattacks is extremely low [Read More]
New York Governor Andrew Cuomo has introduced new cyber security proposals to his January State of the State address. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Ashley Arbuckle's picture
The healthcare industry has a lot to gain by digital transformation. However it also has a lot to lose if it doesn’t start with security as a foundation.
Lance Cottrell's picture
When properly integrated, detection, response, and prevention reinforce each other, each making the other more effective.
Avi Chesla's picture
Our cybersecurity ecosystem needs to be simplified – this is a fundamental challenge that the industry has avoided talking about. This need for simplification is what lies at the core of “Security Abstraction “
Joshua Goldfarb's picture
While sprinting from distraction to distraction may fool some people, it won’t fool nearly enough to justify the risk it introduces into your organization.
Alastair Paterson's picture
As the year comes to a close, let’s take a look at five examples that demonstrate this ongoing tug of war between adversaries and defenders.
David Holmes's picture
You’ll see a lot of security predictions coming around this time of year, and you can make your resolutions based on those. Or you can look back at your own year and customize your own security resolutions.
Scott Simkin's picture
If any of these New Year’s resolutions are not on your “to do” list for 2017, I would challenge you to add them.
Josh Lefkowitz's picture
It's crucial for healthcare institutions to recognize their industry’s inherent susceptibility to cyber threats and that standards and regulations will, by their nature, always be reactive.
Ashley Arbuckle's picture
As 2016 comes to a close, the time is right to look back at the year to reflect on those security lessons we learned and to identify emerging trends.
Steven Grossman's picture
The goal of stopping all cyber attacks and preventing all business impact has been recognized as a fool’s errand, and has shifted to measuring risk and minimizing business impacts.