Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Despite common perception, the WannaCry and NotPetya outbreaks of 2017 have not -- at least, not yet -- had any marked effect on security budgets. [Read More]
Study conducted by Accenture and AMA shows that a majority of physicians in the US have experienced a cybersecurity incident, including phishing, malware and inappropriate access by insiders [Read More]
Google’s Ian Beer releases iOS 11 exploit that can be used for jailbreaks to help security researchers analyze Apple devices [Read More]
Users can now check if systems have been targeted with an NSA hacking tool designed to remove traces of an attack, and even recover deleted logs [Read More]
After getting complaints from developers, Google is evaluating whether it should continue allowing innovative use of accessibility services by Android apps [Read More]
Microsoft used the same certificate for all instances of its Dynamics 365 ERP product and it took more than 100 days to take action, but the company claims the issue posed little risk [Read More]
Synaptics touchpad driver present on hundreds of HP laptops includes keylogging functionality. Patches available for a majority of affected devices [Read More]
New functionality added by Onapsis to its security platform allows SAP customers to check if they are GDPR-compliant [Read More]
NIST publishes second draft of the Framework for Improving Critical Infrastructure Cybersecurity [Read More]
Organizations are getting better at detecting breaches, but attackers are also working on improving their tactics and techniques [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Torsten George's picture
We need to consider whether traditional approaches to vulnerability management are still viable and if just upgrading existing methods or tools is sufficient.
Adam Meyer's picture
It’s that time of year again when we look back at the past year and try to anticipate what we can expect in the coming year. Here is my cybersecurity forecast for 2018.
Rafal Los's picture
Are you accountable for projects you have no authority over? If so, is it too late to renegotiate or at least make a note of this with the right level of leadership?
Scott Simkin's picture
A machine learning system needs to be trained, and it cannot be trained without a large amount of previous data and intelligence.
Preston Hogue's picture
Working closely with business groups throughout the process of due diligence fulfills the CISO’s responsibilities and creates a more security-savvy business.
Josh Lefkowitz's picture
It’s crucial to recognize that 2018 will very likely be yet another year of increasingly complex and damaging threats and incidents, which is why we must always build upon and further enhance our intelligence strategies.
Adam Meyer's picture
If your threat intelligence isn’t practical, it’s not really useful. Here are a few examples of practical questions you can ask your threat analyst team.
Travis Greene's picture
The cybersecurity community needs to identify where untapped resources exist in order to move beyond traditional industry practices and contend with this imbalance.
Oliver Rochford's picture
Compared to the perception that security inhibits productivity and innovation, the reality is bad security has a far greater negative impact.
Marc Solomon's picture
Full automation ignores the key inputs from human intelligence. When it comes to “orient” and “decide,” the human element needs to be involved.