Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Enterprises have identified the weak link in the chain in endpoint security - and if you are an end user, that weak link is probably you, according to a new survey.
Security awareness programs can make the difference between a breach and a non-event, but just how much is the subject of discussion.
Private equity investment firm Inverness Graham said on Wednesday that it has acquired enterprise data management software maker Identity Finder, LLC.
President Obama has outlined a series of data security and privacy proposals in the latest sign the White House and Congress are gearing up to take legislative action on information protection.
The White House made a renewed push Tuesday for cybersecurity legislation, asking the new Congress to revive an initiative stalled over the past few years.
Security experts discuss the implications of the new version of the Payment Card Industry Data Security Standard as the New Year dawns.
Security experts weigh in on what they would like to see in 2015 to make their jobs wrangling users, infrastructure, and data easier.
Alert Logic, a Houston, Texas-based provider of Security-as-a-Service solutions for cloud environments, has acquired Dallas-based Critical Watch for an undisclosed sum.
iSIGHT Partners, Inc., a provider of cyber threat intelligence services, has closed a $30 million Series C funding round with Bessemer Venture Partners.
Bill Conner has been appointed as Chief Executive Officer and member of the Board of Directors at Silent Circle.

FEATURES, INSIGHTS // Management & Strategy

rss icon

Joshua Goldfarb's picture
The past few decades in the information security field have been dominated by passive failure. Clearly, not every new idea has merit, but those ideas that come about scientifically and methodically have tremendous potential to improve the state of security.
Scott Gainey's picture
Several financial analyst firms concluded extensive studies, surveying over a thousand CIOs and CSOs cumulatively, to gain a better understanding of how these breaches are impacting spending behaviors.
Torsten George's picture
With cyber criminals increasingly targeting third-party vendors to gain backdoor access to data at large, well-protected global organizations, security professionals need to rethink their vendor risk management practices.
Danelle Au's picture
A data breach plan lays out the key steps and the key personnel to involve when a data breach happens, and needs to incorporate three elements.
Joshua Goldfarb's picture
At a high level, "big data" and "security analytics" are about the two very different, somewhat diametrically opposed, but equally important concepts of collection and analysis.
Jason Polancich's picture
Most businesses today cannot say with any certainty how the cybersecurity tools or people they acquire and use align with their specific cyber problems.
Avi Chesla's picture
In order to be effective, security solutions must become more directly associated, in real-time, to cyber defense planning models.
Joshua Goldfarb's picture
Asking the right questions is one of the most important and fundamental aspects of a successful security program, and allows security teams to approach challenges analytically and logically.
Torsten George's picture
2015 will prove to be a challenging year for IT security professionals. So, what can we expect in the next 12 months?
Jon-Louis Heimerl's picture
Based on high level review of the types of breaches we have seen over the past year, we should be able to see opportunities to make our environments more resilient to attack.