Security Experts:

Management & Strategy
long dotted


Russian-speaking black hat breaches the systems of more than 60 universities and US government agencies [Read More]
Live from RSA Conference 2017 in San Francisco - Tune in here to watch today's keynotes streamed live from the conference. [Read More]
Report looks how to address the growing skills gap as demand for qualified cyber security professionals continues to outstrip supply. [Read More]
Study conducted by Trend Micro shows the exposure of critical sectors and industrial systems in the United States [Read More]
Microsoft delays February 2017 security updates due to a last minute issue that could not be resolved in time [Read More]
Qualys this week announced new tools and features to provide customers with improved detection capabilities, expanded web application security features, and improved vulnerability data sharing. [Read More]
IBM's Watson is ready to help security analysts sift through network alerts thrown up by the QRadar security intelligence platform in what IBM calls its Cognitive SOC. [Read More]
HPE launches threat investigation solution and data security product for IoT, big data and Hadoop [Read More]
Researchers showed the impact of ransomware on ICS by simulating an attack on a water treatment plant [Read More]
ThreatConnect launches new suite of threat intelligence products that help companies understand adversaries and automate security operations [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Joshua Goldfarb's picture
Let’s take a look at the essential functions required to bring a mature security operations and incident response capability to the masses via a unified security operations platform.
Avi Chesla's picture
Correlating data points through more holistic analytic systems can help reveal the bigger picture and understand the real intent of an attack campaign.
Lance Cottrell's picture
Whether in a bar or in public, on the dark-web or a major news site, the lesson my Kung Fu instructor taught me on that first day can go a long way to keeping you safe.
Rafal Los's picture
When you’re solving problems it’s easy to get lost in creating something complicated. I believe that the more difficult path is to simplify, simplify, simplify.
Steven Grossman's picture
While we all dream of solving the skills shortage by completely automating the entire detection and response process, it is simply unlikely to happen in the foreseeable future.
Erin O’Malley's picture
Today, we expect ultimate convenience. But at what cost? More and more, I’m left wondering whether modern conveniences—grâce à today’s advanced technologies—are truly worth the risk.
Rafal Los's picture
Do you ever find yourself trying to protect your organization from exotic attack scenarios that are highly unlikely or that would have a minimal impact on you?
Scott Simkin's picture
Threat intelligence can play an important role in improving an organization’s overall cybersecurity posture, provided the right case is made and the right processes are put in place.
Ashley Arbuckle's picture
The healthcare industry has a lot to gain by digital transformation. However it also has a lot to lose if it doesn’t start with security as a foundation.
Lance Cottrell's picture
When properly integrated, detection, response, and prevention reinforce each other, each making the other more effective.