Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

The Electronic Frontier Foundation (EFF) on Thursday announced Certbot, a Let's Encrypt client designed to help websites encrypt their traffic. [Read More]
Tumblr resets the passwords of some users after email addresses and passwords from 2013 have been accessed [Read More]
Jeremiah Grossman joins Ryan Naraine to talk about the parallels between jiu-jitsu and computer security and the ongoing cat-and-mouse game between attackers and defenders. [Read More]
Wendy’s credit card breach affects roughly 300 of the company’s 5,500 franchise restaurants [Read More]
Should Clinton be charged with mishandling classified data, she would find herself in the unprecedented position of campaigning for president while embroiled in a legal battle and under federal indictment. [Read More]
Onapsis warns that there are indicators of exploitation against 36 large-scale global enterprises around the world. [Read More]
Facebook has open sourced its capture the flag (CTF) platform to make security education more accessible [Read More]
British businesses have a high awareness of cybersecurity risk, but do relatively little about it, according to The Cyber Security Breaches Survey 2016. [Read More]
Blame for the February cyber theft of $81 million dollars from the Bangladesh central bank New York reserves in February has been levelled at SWIFT technicians by the investigating Bangladeshi police, which SWIFT rejects. [Read More]
Google informed some employees that their personal details were exposed by a third-party vendor [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Joshua Goldfarb's picture
If you’ve centralized all of your security resources, you will have a far more difficult time handling the incident than if you’ve strategically placed security resources around the globe.
David Holmes's picture
The leaked data from the Mossack Fonseca breach is supposed to illuminate dark corners of international tax evaders, but the "Panama Papers" story has many mysteries around it still.
Adam Meyer's picture
All three types of intelligence help drive decisions and ultimately outcomes, but at different levels within the business.
Alastair Paterson's picture
By understanding the different types of incidents and the different returns, you can make a strong case for greater cyber situational awareness in the short- and long-term.
Jennifer Blatnik's picture
It is critical for business leadership to address the growing threat of ransomware as a business risk rather than a siloed IT issue.
Joshua Goldfarb's picture
Before we can understand the purpose of analysis within the greater incident response process, we need to better understand the decision-making process.
Scott Simkin's picture
Threat intelligence is only valuable if an organization takes the necessary steps to quickly and easily apply that intelligence to actual security policy.
Adam Meyer's picture
Gaining awareness of supply chain risks and addressing them in the context of broader risk management programs will put organizations in a much better position when it comes to managing their cyber risk.
Alastair Paterson's picture
Failure to secure sensitive information during the M&A process opens the door to threat actors looking to profit by exploiting financial markets and proprietary intellectual property (IP).
Joshua Goldfarb's picture
Cyber insurance, like any tool, will not solve all of an organization’s problems. But it can help an organization round out its risk mitigation strategy.