Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Banner Health is warning 3.7 million patients, staff and food and beverage customers that their personal data may have been stolen during a security breach traced back to June 23. [Read More]
The U.S. Department of Homeland Security (DHS) has published guidelines on when, how and to which government agency US organizations should report cyber incidents. [Read More]
Presidential Policy Directive (PPD-41) sets forth principles governing the Federal Government’s response to any cyber incident, whether involving government or private sector entities. [Read More]
Atlanta-based Damballa has been bought for what amounts to a pittance by neighboring Roswell-based Core Security. [Read More]
Hackers breached the Ubuntu Forums and managed to steal user data, but active passwords have not been accessed [Read More]
Bay Dynamics, a maker of cyber risk analytics software, has completed a $23 million Series B financing round led by Carrick Capital Partners. [Read More]
SWIFT has engaged the services of outside firms to complement its in-house cyber security expertise and support its information sharing initiative. [Read More]
Former FDIC CIO is accused of covering up several major data breaches, including attacks allegedly conducted by China [Read More]
Healthcare IT security firm Imprivata said on Wednesday that it has agreed to be acquired by an affiliate of private equity giant Thoma Bravo for roughly $544 million in cash. [Read More]
Threat Intelligence and research firm Flashpoint has raised $10 million in Series B funding, and expanded into the Business Risk Intelligence (BRI) market. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Torsten George's picture
Relying solely on existing intelligence provided by vulnerability scanners should only be a first step in a cyber risk management process.
Joshua Goldfarb's picture
Even the best security analysts need high quality, high fidelity base points/jumping off points from which to enter into productive, value-added work.
Joshua Goldfarb's picture
Writing and documenting aren’t the most exciting activities. But they have tremendous potential, both in improving security operations and incident response, as well as in opening up a constructive dialogue.
Ashley Arbuckle's picture
How can security professionals harness cybersecurity to help their organizations take advantage of new opportunities in order to thrive in this digital era?
Ken McAlpine's picture
Once you have an understanding of where your security risks are, you can make better choices about what types and what sources of threat intelligence are most applicable.
Travis Greene's picture
Republicans and Democrats admit that the U.S. government should be doing more to reduce the burden of securing digital business. Perhaps the next president, regardless of which party wins, can find a way to make progress on these wish list items.
Adam Meyer's picture
Threat intelligence is all about reducing uncertainty. A threat intelligence plan should help you define why you are doing what you are doing from an intelligence perspective.
Alastair Paterson's picture
It's important to look at your environment through the eyes of an attacker to detect the threats and vulnerabilities relevant to your organization.
Torsten George's picture
Vulnerability assessments are often confused with penetration tests. In fact, the two terms are often used interchangeably, but they are worlds apart.
Joshua Goldfarb's picture
You’ll never see someone who solved their alert fatigue issues and runs an efficient security operations program on the six o’clock news. Hacking is sexy, but defending is an important piece of the security puzzle.