Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Chinese hackers reportedly exploited the infamous “Heartbleed” vulnerability in OpenSSL to compromise Community Health Systems and steal patient data.
SAN FRANCISCO - Former Microsoft chief Steven Ballmer said he is stepping down as a member of the software giant's board of directors.
Redwood Shores, California-based Imperva announced on Monday that it has appointed Anthony J. Bettencourt as the company’s new president and chief executive officer.
Oberthur Technologies announced that it would acquire NagraID Security SA for an undisclosed sum.
A recent security bulletin released by Microsoft as part of the August 2014 Patch Tuesday can lead to a crash on some systems, the company said in a knowledge base article.
Supervalu and Albertsons are notifying customers that information associated with their payment cards might have been stolen after hackers broke into systems that processes credit and debit card transactions.
Threat actors targeting Lockheed Martin immediately halted their cyberattacks against the defense contractor following the release of Mandiant’s APT1 report, Lockheed executives told SecurityWeek.
Private equity investment firm Thoma Bravo announced on Wednesday that it would take a significant equity investment in SailPoint, a provider of identity and access management (IAM) solutions.
NIST wants to build a reconfigurable cybersecurity testbed to provide guidance on the best practices for implementing security strategies within industrial control systems without negatively impacting process performance.
IBM has made another move to expand and enhance its Identity and Access Management (IAM) offerings, announcing that it has acquired the business operations of cloud-based IAM vendor Lighthouse Security Group.

FEATURES, INSIGHTS // Management & Strategy

rss icon

Travis Greene's picture
The significant breaches of today are executed by people infiltrating the organization, and attackers are doing this by assuming identities or abusing insider privileges.
James McFarlin's picture
Launched in 2009, CyberPatriot began with eight high school cybersecurity teams competing for scholarships. In just six years, participation quickly expanded to more than 1500 teams around the world.
Joshua Goldfarb's picture
Amidst recent headlines, I am concerned that as a security community, we are losing sight of an important principle that is very important to remember: not all intrusions involve malware.
Scott Gainey's picture
Corporate stewards are getting educated in a hurry and are gearing up to ask some very pointed questions regarding strategy for protecting company data.
Jason Polancich's picture
Businesses have more data on hand than they think. They key is crafting a plan to track it and combine it with data from outside their own walls against which the internal data can be analyzed.
James McFarlin's picture
One can only hope our nation’s alarm clocks wake up and stir our national leaders’ imaginations before a cyber incident of the magnitude of 9/11 results in the need for a “Cyber Strikes Commission Report.”
Joshua Goldfarb's picture
I am often asked the question: “Is security an unsolvable problem?” In order for me to answer that question, I would have to understand it, and I don’t.
Danelle Au's picture
Enterprises can gain tremendous competitive advantages by having IT focus on the things that matter – users and information rather than infrastructure maintenance and building.
Torsten George's picture
When an organization is solely focused on strengthening its compliance posture to pass an audit, they primarily look at control failures and gaps and try to mitigate them.
Mark Hatton's picture
You need to identify your security shortcomings before someone else does. Simulate attacks and tests to associate known vulnerabilities, previous attack patterns, and security/network data to identify potential attack paths to your company’s most important data.