Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

DHS issues binding operational directive requiring all federal agencies to use HTTPS, DMARC and STARTTLS [Read More]
Security consulting firm AsTech has announced a $1 million guarantee for its Qualys Managed Services offering. [Read More]
Microsoft, Google, HP, Lenovo and Fujitsu warn customers of crypto vulnerability in Infineon chips [Read More]
Pizza Hut hacked. Users who placed an order on the website or via the mobile app may have had their credit card data stolen [Read More]
Sample data provided by scammers claiming to have hacked Equifax may have come from another company’s unprotected QA servers [Read More]
41 Hyatt hotels in more than a dozen countries hit by payment card breach. This is the second breach discovered by the company within two years [Read More]
Websites of credit reporting agencies Equifax and TransUnion redirected users to malware, adware and scams due to a third-party web analytics script [Read More]
Increasing number of organizations moved to Office 365, but many haven’t migrated due to security concerns, including ransomware and phishing [Read More]
High-Tech Bridge launches Mobile X-Ray, a free online service designed for testing native and hybrid iOS and Android apps [Read More]
ShiftLeft emerges from stealth mode with new solution designed to protect cloud applications and microservices, and with over $9 million in funding [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Rafal Los's picture
With the many strategy development workshops in which I’ve successfully engaged, it’s hard to believe how many companies struggle with stakeholders as a starting point.
Justin Fier's picture
When third-parties are integrated onto the network, threats are bound to slip through the cracks, and the Equifax hack demonstrated how easy it is for a subtle threat to develop into a debilitating data breach.
Travis Greene's picture
If awareness isn’t working to change the behavior of employees and consumers, is there anything that can be done?
Preston Hogue's picture
As security professionals, it’s on us to understand the business implications of those conveniences and the impact they may have.
Joshua Goldfarb's picture
A seat at the security table should not be for only the elite and largest of businesses or security vendors. The time has come to democratize security.
Josh Lefkowitz's picture
Business Risk Intelligence (BRI) can help inform their decisions, gain a decision advantage over adversaries, and mitigate a broad spectrum of cyber and physical risks.
Lance Cottrell's picture
While mergers and acquisitions (M&A) are generally known for bringing economic growth and opportunity, people are beginning to realize that the process also brings serious cybersecurity risks.
Marc Solomon's picture
With the sheer volume of threat data continuing to climb at a staggering rate, security teams need to start with the threat – automating how we gather, score and prioritize threat intelligence.
Ashley Arbuckle's picture
MSSPs help alleviate the complexity of maintaining and managing a proliferation of security products and point solutions in order to get their full value.
Joshua Goldfarb's picture
Benchmarking is about understanding how people use a variety of different products and services, what challenges they use them to address, and how those products and services fit into the organization’s security strategy.