Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Cybercrime costs are escalating for US companies and attacks are becoming more complicated to resolve, a study showed Wednesday.
Risk I/O has raised an additional $4 million as part of its Series A financing round, and has named Karim Toubba as chief executive officer.
Organization should know four things before going public about a breach: What happened, how it happened, what you are doing to prevent it from happening again, and what you are doing to protect people affected by the incident.
Several sophisticated threat groups have breached the systems of a major critical manufacturing company, the Department of Homeland Security (DHS) revealed in a report.
A new report from (ISC)2 and the University of Phoenix sheds light on the challenges of closing the cyber-security workforce gap and offers recommendations to businesses, students and employers.
Several US financial institutions were targeted by the same computer hackers who breached the systems of JPMorgan Chase earlier this year, sources familiar with the matter said Wednesday.
Welcome to the Interactive Agenda for the 2014 ICS Cyber Security Conference! After a sell-out conference in 2013, be sure to Register Now and confirm your spot for this year’s event!
Data belonging to customer of MBIA Inc., the largest bond insurer in the United States, was inadvertently made available online due to a misconfigured Web server.
Sophos has acquired Mojave Networks, a cloud-based security solutions provider based in San Mateo, California.
Yahoo! CISO Alex Stamos said that three Yahoo Sports API servers had malicious code executed on them recently by attackers looking for vulnerable Shellshock server.

FEATURES, INSIGHTS // Management & Strategy

rss icon

Jason Polancich's picture
Your employees, partners, customers and suppliers are your “survival group” battle-buddies now and it’s important to know how the zombies behave and where they hide.
James McFarlin's picture
A bountiful source of innovative new products for mature security providers lies in the hunting ground of promising newer firms.
Adam Firestone's picture
The imposition of externally-defined cybersecurity methodologies and solutions on both government and critical infrastructure programs hasn’t proven effective. Fortunately, the political and technical winds are shifting
Joshua Goldfarb's picture
As information security professionals, it is tempting to become enamored with the beauty or elegance of a technical solution, analytical technique, or investigative outcome.
James McFarlin's picture
Very little will get a board of directors’ attention as quickly as a cyber data breach with its attendant risks of damage to market capitalization, competitive advantage and brand reputation.
Mark Hatton's picture
Software and hardware alone are not enough to manage a massive enterprise security program. You need security professionals and experienced leaders who can keep the team (and the tools) operating effectively.
Jason Polancich's picture
Las Vegas has created a market-proven, repeatable formula for business success. For enterprises competing each and every day with cybercriminals, what if we were to apply these same principles to enterprise cybersecurity?
Joshua Goldfarb's picture
Proper visibility doesn’t have to mean a deluge of uncoordinated data sources. To security operations and incident response teams, the buzz and hype should be about “big value”, not “big data”.
Marcus Ranum's picture
A few years ago, there was a bit of discussion about improving security. A number of researchers' systems and faculty systems had been compromised, and “something must be done” - but what?
James McFarlin's picture
With risks to national and economic security increasing, other avenues of cyber defense are receiving attention. Improving resilience and the promising application of predictive analysis to the prevention of cyberattacks before they occur are two such areas