Security Experts:

Management & Strategy
long dotted


Symantec has completed the sale of Veritas to a group of investors led by The Carlyle Group, giving Symantec roughly $5.3 billion in after-tax cash proceeds—$1 billion less than the company originally expected to receive. [Read More]
Israel represents only 0.1 percent of the world's population but roughly 20 percent of global investments in cyber security. [Read More]
British bank HSBC has managed to gets its Internet and mobile banking systems back online after crippling distributed denial of service (DDOS) attack knocked systems offline on Friday. [Read More]
Security firm Kaspersky Lab will host the 2016 edition of its Security Analyst Summit (SAS) on February 7-11 at the Ritz-Carlton, Abama luxury resort in Tenerife, Spain. [Read More]
cPanel tells Store and Manage2 users to reset passwords after detecting a database breach [Read More]
Multi-vector denial of service (DDoS) attacks are increasing in frequency, complexity and size, Arbor Networks’ 11th Annual Worldwide Infrastructure Security Report (WISR) reveals. [Read More]
Royal Caribbean Cruises has hired long time security industry veteran Renee Guttman as Chief Information Security Officer (CISO), effective January 25, 2016. [Read More]
F5 Networks announced on Monday that Mike Convertino has joined the company as its first Chief Information Security Officer (CISO). [Read More]
National Background Investigations Bureau will be created to conduct background checks for federal employees and contractors with a more secure database. [Read More]
HD Moore has decided to leave Rapid7 and join a new venture capital firm focusing on helping early-stage security companies [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Bill Sweeney's picture
Cyber defense will continue to make the transition from IT problem to boardroom matter. Leading companies have already recognized this and we’ve passed the inflection point towards universal acceptance.
Tim Layton's picture
By understanding your adversaries’ activity on the Dark Web , you can take more of a proactive approach that helps reduce uncertainty and improves overall cyber resiliency.
Alastair Paterson's picture
As security professionals, it’s our job to enable business while protecting it; embracing social media is an imperative, but we also need to mitigate the exploitation of what our organizations reveal online.
Joshua Goldfarb's picture
Every organization will have its limitations and resource constraints. But that doesn’t mean the organization should aim solely for "good enough" security.
David Holmes's picture
After designating 2014 as “The Year of the Mega-Breach,” the security community hoped to bring awareness to the challenge of protecting customer data. As it turns out, the breaches of 2015 make the previous year’s ones pale in comparison.
Wade Williamson's picture
Specific malicious payloads, URLs and IP addresses are so ephemeral that they may only be used once in the case of a true targeted attack. Intelligence should make you better prepared to evaluate and solve new problems that you haven’t encountered before.
Bill Sweeney's picture
Alert monitoring should entail an assessment of effectiveness and a realization that increasing volumes can't be managed by overwhelmed staff. How can your team cut through the noise and better-manage security alerts?
Joshua Goldfarb's picture
The best security professionals understand that there are some things that money just cannot buy. Relationships.
Alastair Paterson's picture
With a better understanding of what the future may hold, organizations can gain an upper hand with the adversary, preventing, detecting and containing cyber-related incidents.
Travis Greene's picture
To understand why return on Access Governance is lower versus other security technologies, we first need to understand why Access Governance is implemented in the first place.