Security Experts:

Management & Strategy
long dotted


Singtel has entered into a definitive agreement to acquire Chicago-based data security and compliance solutions firm Trustwave.
Uber has hired former Facebook security chief Joe Sullivan as its new Chief Security Officer.
Check Point Software Technologies said on Thursday that it would acquire Lacoon Mobile Security, a provider of enterprise security solutions for iOS and Android devices.
Opinions of the value of threat intelligence in protecting enterprise security was mixed in a new survey.
Systems and security management company Tanium has secured an additional $52 million in funding from Silicon Valley VC firm Andreessen Horowitz.
If you want to make your case for investing in advanced threat protection to your company’s executives, then you’ll need to think like your executives.
Lookingglass Cyber Solutions raised $20 million in new capital through a Series B round of funding.
The 2015 ICS Cyber Security Conference (15th!) will take place October 26-29th at the Georgia Tech Hotel and Conference Center in Atlanta, Georgia.
UK-based Darktrace, a cyber security startup that leverages machine learning and mathematics to detect threats, has raised $18 million in funding from investors including Invoke Capital, Talis Capital, Hoxton Ventures and private individuals.
Attackers hacking into American computer networks appear to be leaving "cyber fingerprints" to send a message that critical systems are vulnerable, Admiral Michael Rogers, director of the NSA and head of US Cyber Command, said Thursday.

FEATURES, INSIGHTS // Management & Strategy

rss icon

Joshua Goldfarb's picture
Tree rings occur when the growing season ends and growth stops. To avoid stagnation, a security organization must never stop growing.
Wade Williamson's picture
By building security controls that identify and correlate the malicious behaviors of an attack, we can begin to the tip the scales back in our favor.
Pat Calhoun's picture
While individual products and technologies are important weapons, they operate in a silo and lose sight of the bigger picture. The reality is that you can’t just rely on a single defense or a silver bullet.
Torsten George's picture
These four cyber security building blocks can help organizations can fulfill their requirements for quantitative risk reporting and neutralize the impact of cyber-attacks.
Jason Polancich's picture
We seem to be at a watershed moment in both the cybersecurity market and with our business cyber defense circumstances.
Marcus Ranum's picture
When you start keeping a long-term data series, remember that you can't change your algorithm for interpreting it on a regular basis.
Joshua Goldfarb's picture
While intelligence is a critical component of a mature security program, it should not drive security. A risk-driven approach provides a much more comprehensive and scientific approach that allows organizations to keep pace with today’s sophisticated threats.
Rafal Los's picture
As long as the “hikers and bear” analogy is told in boardrooms we will have difficulty communicating the value of a proportionate security model where we design security measures for different types of adversaries with different types of objectives.
Nate Kube's picture
Nate introduces various perspectives on cybersecurity as a moniker, shares some illuminating data, and presents a vernacular to move our field forward.
Torsten George's picture
The NIST Cybersecurity Framework is an important building block, but still just the first step towards implementing operationalized defenses against cyber security risks.