Security Experts:

Management & Strategy
long dotted


Experts warned at a conference in Saudi Arabia of a critical shortage of global specialists trained to confront increasingly malicious cyber security threats.
Please join us for an interactive webcast on April 28 to learn how to improve the resiliency of your organization's strategic risk management and business operation.
US Defense Secretary Ashton Carter will head to Silicon Valley on Thursday in a bid to recruit tech gurus for the Pentagon, even if just on a part-time basis.
After agreeing to merge in late 2014, Accuvant and FishNet Security said the new combined company will be called Optiv Security.
Centrify has launched a new cloud-based identity management solution designed to address the needs of hybrid IT environments of on-premises and cloud-based systems.
US Homeland Security Secretary Jeh Johnson announced that his office is "finalizing plans to open up a satellite office in Silicon Valley, to serve as another point of contact with our friends here."
BlackBerry has agreed to acquire WatchDox, a Palo Alto, Calif.-based provider of enterprise solutions to access, share and protect sensitive documents, for an undisclosed sum.
Raytheon will contribute $1.9 billion (net of cash acquired) to acquire Websense, of which $600 million will be in the form of an intercompany loan to the yet to be named joint venture.
Fox-IT launches Cyberthreat Management Platform designed to help organizations strengthen intelligence, prevention, detection, and response operational capabilities.
WikiLeaks published thousands of documents on Thursday from last year's Sony hacking scandal, calling them an insight into the inner workings of a "secretive" firm.

FEATURES, INSIGHTS // Management & Strategy

rss icon

Torsten George's picture
How can companies deal with this challenge and transition to a model that uses more data to assess risks? One way is to implement cyber security operational risk management best practices.
Rafal Los's picture
Security leaders struggle to replicate successes from one enterprise to another largely because they are starting from scratch at every new turn.
Mark Hatton's picture
In the world of security, there is often a significant difference between perceived reality and what is actually happening, and the public’s perception of security within your organization can be just as important as reality.
Rafal Los's picture
Prioritizing is an unenviable job many security professionals must do every day – do you go live with a product on time, or do you hold it to fix that security bug which could cause a catastrophic failure?
Joshua Goldfarb's picture
The question of build or buy is not a new one, but it is one that does not adequately suit the implementation of a security solution.
Torsten George's picture
With the growing number of data breaches and a whole new set of security challenges facing companies, it’s time to re-examine the definition of IT risk management.
Joshua Goldfarb's picture
Tree rings occur when the growing season ends and growth stops. To avoid stagnation, a security organization must never stop growing.
Wade Williamson's picture
By building security controls that identify and correlate the malicious behaviors of an attack, we can begin to the tip the scales back in our favor.
Pat Calhoun's picture
While individual products and technologies are important weapons, they operate in a silo and lose sight of the bigger picture. The reality is that you can’t just rely on a single defense or a silver bullet.
Torsten George's picture
These four cyber security building blocks can help organizations can fulfill their requirements for quantitative risk reporting and neutralize the impact of cyber-attacks.