Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

A new survey found that many businesses are not fully implementing their security solutions due to a lack of staff resources.
The gulf between reality and perception is widening, according to Cisco’s annual survey of CISOs and security executives.
Enterprises have identified the weak link in the chain in endpoint security - and if you are an end user, that weak link is probably you, according to a new survey.
Security awareness programs can make the difference between a breach and a non-event, but just how much is the subject of discussion.
Private equity investment firm Inverness Graham said on Wednesday that it has acquired enterprise data management software maker Identity Finder, LLC.
President Obama has outlined a series of data security and privacy proposals in the latest sign the White House and Congress are gearing up to take legislative action on information protection.
The White House made a renewed push Tuesday for cybersecurity legislation, asking the new Congress to revive an initiative stalled over the past few years.
Security experts discuss the implications of the new version of the Payment Card Industry Data Security Standard as the New Year dawns.
Security experts weigh in on what they would like to see in 2015 to make their jobs wrangling users, infrastructure, and data easier.
Alert Logic, a Houston, Texas-based provider of Security-as-a-Service solutions for cloud environments, has acquired Dallas-based Critical Watch for an undisclosed sum.

FEATURES, INSIGHTS // Management & Strategy

rss icon

Fahmida Y. Rashid's picture
Piper Jaffray's fourth annual CIO survey found that 75 percent of CIOs were expecting to increase their security spending in 2015. But are these security investments spent and utilized wisely?
Joshua Goldfarb's picture
The past few decades in the information security field have been dominated by passive failure. Clearly, not every new idea has merit, but those ideas that come about scientifically and methodically have tremendous potential to improve the state of security.
Scott Gainey's picture
Several financial analyst firms concluded extensive studies, surveying over a thousand CIOs and CSOs cumulatively, to gain a better understanding of how these breaches are impacting spending behaviors.
Torsten George's picture
With cyber criminals increasingly targeting third-party vendors to gain backdoor access to data at large, well-protected global organizations, security professionals need to rethink their vendor risk management practices.
Danelle Au's picture
A data breach plan lays out the key steps and the key personnel to involve when a data breach happens, and needs to incorporate three elements.
Joshua Goldfarb's picture
At a high level, "big data" and "security analytics" are about the two very different, somewhat diametrically opposed, but equally important concepts of collection and analysis.
Jason Polancich's picture
Most businesses today cannot say with any certainty how the cybersecurity tools or people they acquire and use align with their specific cyber problems.
Avi Chesla's picture
In order to be effective, security solutions must become more directly associated, in real-time, to cyber defense planning models.
Joshua Goldfarb's picture
Asking the right questions is one of the most important and fundamental aspects of a successful security program, and allows security teams to approach challenges analytically and logically.
Torsten George's picture
2015 will prove to be a challenging year for IT security professionals. So, what can we expect in the next 12 months?