Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Threat Intelligence and research firm Flashpoint has raised $10 million in Series B funding, and expanded into the Business Risk Intelligence (BRI) market. [Read More]
Microsoft on Thursday announced a shake-up in its top ranks, including the departure of longtime chief operating officer Kevin Turner for a new job. [Read More]
Microsoft has published a paper that proposes a series of recommended 'norms' of good industry behavior in cyberspace, along with proposing a public-private body to attribute severe cyber attacks. [Read More]
The EU will invest €450 million in a new public-private partnership on cybersecurity that is expected to trigger €1.8 billion of investment by 2020. [Read More]
There are two primary security concerns over the 'Brexit'. Firstly that corporate security defenses will be weakened, and secondly that international threat intelligence sharing with Europe will diminish. [Read More]
Carbonite is the latest company hit by a password reuse attack. Password reset emails look phishy [Read More]
GoToMyPC has reset the passwords of all users after what it calls a “very sophisticated password attack” [Read More]
GitHub resets passwords after attackers used leaked credentials to hack accounts [Read More]
The 2016 Ponemon 'Cost of Data Breach Study' found that the average cost per lost or stolen record within the scope of the study is now $158. [Read More]
Cybersecurity executives could lose their jobs if they fail to provide useful, actionable information, a recent survey reveals. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Travis Greene's picture
Republicans and Democrats admit that the U.S. government should be doing more to reduce the burden of securing digital business. Perhaps the next president, regardless of which party wins, can find a way to make progress on these wish list items.
Adam Meyer's picture
Threat intelligence is all about reducing uncertainty. A threat intelligence plan should help you define why you are doing what you are doing from an intelligence perspective.
Alastair Paterson's picture
It's important to look at your environment through the eyes of an attacker to detect the threats and vulnerabilities relevant to your organization.
Torsten George's picture
Vulnerability assessments are often confused with penetration tests. In fact, the two terms are often used interchangeably, but they are worlds apart.
Joshua Goldfarb's picture
You’ll never see someone who solved their alert fatigue issues and runs an efficient security operations program on the six o’clock news. Hacking is sexy, but defending is an important piece of the security puzzle.
Ashley Arbuckle's picture
C-suite leaders should be thinking about cybersecurity as a strategic advantage that can set them apart from competitors.
Eddie Garcia's picture
One of the best use cases for big data is to use Hadoop for log ingestion and security analytics. Through audit, we can ensure that the security controls that are in place are working correctly and identify attempts to circumvent them.
Jennifer Blatnik's picture
It's been a dirty little secret among those of us in the security industry that there are two types of security solution providers...
Ken McAlpine's picture
While consuming, consolidating, and correlating information provides obvious benefits, always keep in mind how you and your organization can also contribute back to these information feeds.
Rafal Los's picture
With limited resources at your disposal, you as the security leader should work hard to make your team as efficient as possible.