Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Yahoo slashed the price of the sale of its core Internet business to Verizon by $350 million following a pair of major data breaches at Yahoo, the two companies announced Tuesday. [Read More]
Cisco launches four new Firepower next-generation firewalls for businesses that perform a high volume of sensitive transactions [Read More]
Breach that may have affected many major organizations comes to light after nearly two years. Links found to Chinese APTs [Read More]
Microsoft postponed security updates to March 14, but decided to release one after all to address Flash Player vulnerabilities in IE and Edge [Read More]
Researchers warn about the threat posed by logic bombs to industrial control systems (ICS), particularly programmable logic controllers (PLCs) [Read More]
CompTIA has announced CSA+, a new security qualification which focuses on the skills required for the use of threat detection tools, data analysis and the interpretation of results to identify vulnerabilities, threats and risks. [Read More]
Implementation bug allowed an attacker to create 370,000 Zcoins and make a profit of over $400,000 [Read More]
Google shares data on the malware, phishing and spam emails targeting corporate Gmail inboxes [Read More]
Kaspersky analyzed Android apps for several connected cars and found that most of them lack crucial security features [Read More]
Microsoft informed customers that the February patches will only be released on March 14 as part of the next planned Update Tuesday [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Marc Solomon's picture
There are strategies you can use so that the risk score is more relevant and useful within your specific environment.
Torsten George's picture
Let’s consider whether the proposed principles and tools by the World Economic Forum (WEF) can improve cyber resilience, and which types of enterprises can benefit most from implementing them.
Joshua Goldfarb's picture
Let’s take a look at the essential functions required to bring a mature security operations and incident response capability to the masses via a unified security operations platform.
Avi Chesla's picture
Correlating data points through more holistic analytic systems can help reveal the bigger picture and understand the real intent of an attack campaign.
Lance Cottrell's picture
Whether in a bar or in public, on the dark-web or a major news site, the lesson my Kung Fu instructor taught me on that first day can go a long way to keeping you safe.
Rafal Los's picture
When you’re solving problems it’s easy to get lost in creating something complicated. I believe that the more difficult path is to simplify, simplify, simplify.
Steven Grossman's picture
While we all dream of solving the skills shortage by completely automating the entire detection and response process, it is simply unlikely to happen in the foreseeable future.
Erin O’Malley's picture
Today, we expect ultimate convenience. But at what cost? More and more, I’m left wondering whether modern conveniences—grâce à today’s advanced technologies—are truly worth the risk.
Rafal Los's picture
Do you ever find yourself trying to protect your organization from exotic attack scenarios that are highly unlikely or that would have a minimal impact on you?
Scott Simkin's picture
Threat intelligence can play an important role in improving an organization’s overall cybersecurity posture, provided the right case is made and the right processes are put in place.