Security Experts:

Management & Strategy
long dotted


Following rumors that an announcement was soon to come, Yahoo! said Thursday that hackers managed to access data from at least 500 million user accounts a cyberattack dating back to 2014. [Read More]
The SWIFT Daily Validation Reports are expected to be introduced during December 2016. It might be "another couple of years before anything is formalized" from the committee of central banks. [Read More]
Edward Snowden was a "disgruntled employee" and not a "principled whistleblower," according to a report from Congress, which comes amid mounting pressure for a presidential pardon. [Read More]
Security ratings firm BitSight Technologies has raised $40 million in a Series C financing funding round, bringing the total raised to date by the company $95 million. [Read More]
Brigadier General (retired) Gregory J. Touhill has been named the first Federal Chief Information Security Officer (CISO). [Read More]
Roughly six years after announcing that it would acquire security firm McAfee, Intel Corporation said it would spin off its security division as an independent company under the name McAfee. [Read More]
Dell has completed its acquisition of data storage firm EMC, creating the largest privately held technology group with a range of computing services. [Read More]
In a private letter to its members on Tuesday, SWIFT has disclosed that additional cyber attacks have surfaced since its last update in June. [Read More]
The email addresses and passwords pertaining to a total of 68,648,009 Dropbox accounts have been compromised following a data breach in 2012. [Read More]
Different studies have placed doubt on which ‘cost of breach’ organizations should use in their own risk assessment. If a cost of breach study is relevant to only some companies in only some contexts, what is their real value? [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Ashley Arbuckle's picture
But by asking these key questions you can understand what’s required to proactively detect and respond to today’s malicious and complex attacks.
Rafal Los's picture
How do you win when you don’t know the rules? Adaptation is key. Even if you don’t know the rules, you know the game.
Dan Cornell's picture
Security teams and DevOps teams aren’t always on the same page and the lack of communication often results in misaligned priorities that significantly inhibit productivity.
Joshua Goldfarb's picture
Everyone loves a pretty picture or a slick graph, but very rarely do these supposed visualizations add any real value to security operations.
Adam Meyer's picture
Cyber threat intelligence isn’t just another tool or layer of protection for your organization. It’s a capability that drives more effective cybersecurity decisions and more investment.
Steven Grossman's picture
In order to demonstrate they understand how cyber risk plays into their company’s operations and bottom line, CISOs must communicate risk in the same way other business leaders communicate about other operational risks.
Alastair Paterson's picture
Sophisticated adversaries are finding vulnerabilities wherever they can, and often that means looking to an organization’s partners for weaknesses in defenses.
Torsten George's picture
By implementing these three main pillars, organizations can operationalize their cyber security practices to shorten time-to-detection and ultimately, time-to-remediation of cyber threats.
Scott Simkin's picture
Cybersecurity needs to build bridges between the security operations (SecOps), network operations (NetOps) and physical security teams to be successful.
Ashley Arbuckle's picture
Managed Detection and Response (MDR) services differ from traditional managed security services in three ways: speed, accuracy, and focus. Here’s how.