Security Experts:

Management & Strategy
long dotted


Data collected by Flashpoint over the course of 4 years shows which communication tools are most popular among cybercriminals worldwide [Read More]
Kaspersky extends bug bounty program - adds Password Manager to scope and increases maximum reward to $5,000 [Read More]
Critical vulnerability in the References module for Drupal exposes more than 120,000 websites to attacks [Read More]
Company confirms cybercriminals used malware to steal payment card data from nearly 40 Shoney’s restaurants [Read More]
Microsoft assures customers that the latest Shadow Brokers exploits have already been patched, including several with March updates [Read More]
Researchers disclose details of an unpatched Magento vulnerability that can be exploited by hackers to hijack online stores [Read More]
Join this interactive webinar on to learn real-life examples and pragmatic practices for reducing the risk of inside threat data loss. [Read More]
The Intelligence and National Security Alliance (INSA) proposes that physical user behavioral analytics should go a step further and incorporate psycho-analytics set against accepted behavior models. [Read More]
DARPA is seeking proposals for hardware architectures that will disarm many of today’s software attacks [Read More]
Microsoft addresses more than 40 vulnerabilities, including three zero-days exploited in attacks [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Avi Chesla's picture
At the end of the day, CISOs are finding it very challenging to be able to assess the performance of the security products in their organization’s arsenal.
Steven Grossman's picture
Without visibility into your information assets, their value, where they live, how they relate to each other and who has access to them, any strategy for protection would be inherently incomplete and ineffective.
Adam Meyer's picture
In the cyber threat intelligence space, there is confusion (much of which is driven by vendors)... where threat information is positioned as finished intelligence.
Joshua Goldfarb's picture
Organizations should not be lured into a false sense of security if they deal in information or data that are not typically sought after by nation-state attackers.
Lance Cottrell's picture
Wouldn’t it be great if cyber security teams could spend more time acting like the doctors and surgeons who work away from emergency rooms and ICUs?
Josh Lefkowitz's picture
Digital risk monitoring is a helpful tool for organizations that already have rich intelligence and not just data. Failing to distinguish between the two can be problematic.
Torsten George's picture
There are several steps that both information security and DevOps teams can take to minimize their attack surface in the context of these emerging technologies and development practices.
Marc Solomon's picture
A threat intelligence platform (TIP) needs to operationalize and apply intelligence as the glue to reduce fragmentation.
Travis Greene's picture
April is Stress Awareness Month. With the pace of constantly-evolving threats, budget battles and security apathy from users, it isn’t a stretch to imagine that stress is a part of the job in IT security.
Steven Grossman's picture
With the right cyber hygiene up front in addition to tools and processes utilized on an ongoing basis, the impact of insider threats can be greatly reduced and mitigated.