Security Experts:

Management & Strategy
long dotted


The stable series of Grsecurity’s Linux kernel patches will no longer be publicly available. Decision comes in response to GPL violations by the embedded Linux industry.
Famous car hacker Charlie Miller has resigned from Twitter after three years.
Sven Sakkov replaces Colonel Artur Suzik as the director of the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE).
Facebook’s ThreatExchange platform now has more than 90 participants and over 3 million monthly interactions. Application process simplified.
AlienVault has closed an impressive $52 million Series E funding round, bringing the total raised by the company to nearly $116 million. said that hackers breached a server and made away with credit card and personal information of roughly 93,000 of its customers.
Symantec will sell its Veritas information management business to investment firm The Carlyle Group for roughly $8 billion in cash.
The FBI is having trouble filling jobs for its cybersecurity programs because of comparatively low pay and rigorous background checks, an auditor's report says.
Zscaler, a provider of cloud-based security solutions, has raised $100 million in a round of funding led by late stage investor TPG.
Hackers breach systems of operations performance management firm PagerDuty. Names, email addresses, and password hashes accessed in attack.

FEATURES, INSIGHTS // Management & Strategy

rss icon

Travis Greene's picture
In the case of Hilary Clinton's personal email server, we know that Top Secret information was transmitted over a network that likely wasn’t equipped to safeguard it. If her server was a target of foreign state actors, the implications are frightening.
Torsten George's picture
Organizations that address certain inhibitors to risk management head-on, can significantly reduce the time it takes to produce risk profiles.
Wade Williamson's picture
In security circles, 2014 was known colloquially as “the year of the breach.” However, 2015 almost doubled the 2014 tally of breached records, and has done so in the first eight months.
Joshua Goldfarb's picture
The way in which we as a security community seem to be approaching the topic of information sharing seems backward to me.
Rafal Los's picture
Security people who jump into troubled security organizations to help right the ship put their careers on the line and personal aspirations on hold, and their families take a temporary back seat.
Travis Greene's picture
As much fun as it is to wake up to patches waiting to be unwrapped, we don’t want the regret of “exploit Wednesday”, which is far more embarrassing than becoming a victim of a zero-day exploit.
Joshua Goldfarb's picture
Detection is a philosophy, approach, and methodology that seeks to identify suspicious or malicious behaviors matching risks and threats the organization is concerned about.
Torsten George's picture
Some insurers are citing litigation and poor operations as reasons not to payout on losses.
Rafal Los's picture
Most of a company’s security program elements should have three pieces – those you build, those you buy and those for which you find a partner to help you manage.
Scott Gainey's picture
Organizations are asking the question – how much do I really need to spend on security in order to tip the scales in my favor? In order to answer that question you must first quantify the impact and risk of a cyber attack.