Security Experts:

Management & Strategy
long dotted


Is your security program paying off for the business? Most organizations are looking at the wrong information and data for measuring security effectiveness. If you can’t properly measure your security posture, how do you know it’s working? How do you improve it? [Read More]
Barnstable Police Department survived a ransomware attack without paying any ransom, thanks to a disaster recovery solution. [Read More]
Users file class actions against Yahoo in California and Illinois over the recently disclosed data breach that affected 500 million accounts [Read More]
Yahoo's claim that it is the victim of a gigantic state-sponsored hack raises the question of whether it is the latest target for hackers with the backing of Russia, China or even North Korea, experts say. [Read More]
Yahoo faced pressure to explain how it sustained a massive cyber-attack -- one of the biggest ever, and allegedly state-sponsored -- allowing hackers to steal data from half a billion users two years ago. [Read More]
Following rumors that an announcement was soon to come, Yahoo! said Thursday that hackers managed to access data from at least 500 million user accounts a cyberattack dating back to 2014. [Read More]
The SWIFT Daily Validation Reports are expected to be introduced during December 2016. It might be "another couple of years before anything is formalized" from the committee of central banks. [Read More]
Edward Snowden was a "disgruntled employee" and not a "principled whistleblower," according to a report from Congress, which comes amid mounting pressure for a presidential pardon. [Read More]
Security ratings firm BitSight Technologies has raised $40 million in a Series C financing funding round, bringing the total raised to date by the company $95 million. [Read More]
Brigadier General (retired) Gregory J. Touhill has been named the first Federal Chief Information Security Officer (CISO). [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Ashley Arbuckle's picture
What it takes to operate security operation center (SOC) effectively has changed in this ever-evolving threat landscape, putting an even greater burden on analysts and the technologies they rely upon.
Rocky DeStefano's picture
Hadoop — with its ability to ingest, process and provide analytics for nearly untold amounts of data — is being adopted to solve many of the cybersecurity challenges we face.
Joshua Goldfarb's picture
The modern security practitioner needs to be a pragmatist that works with the business to improve security without negatively impacting the business.
Torsten George's picture
Implementing a Zero Trust model represents a dramatic change and requires a well-planned transition that should be complimented by efforts to operationalize cyber risk detection, prevention, and response.
Ashley Arbuckle's picture
But by asking these key questions you can understand what’s required to proactively detect and respond to today’s malicious and complex attacks.
Rafal Los's picture
How do you win when you don’t know the rules? Adaptation is key. Even if you don’t know the rules, you know the game.
Dan Cornell's picture
Security teams and DevOps teams aren’t always on the same page and the lack of communication often results in misaligned priorities that significantly inhibit productivity.
Joshua Goldfarb's picture
Everyone loves a pretty picture or a slick graph, but very rarely do these supposed visualizations add any real value to security operations.
Adam Meyer's picture
Cyber threat intelligence isn’t just another tool or layer of protection for your organization. It’s a capability that drives more effective cybersecurity decisions and more investment.
Steven Grossman's picture
In order to demonstrate they understand how cyber risk plays into their company’s operations and bottom line, CISOs must communicate risk in the same way other business leaders communicate about other operational risks.