Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Uber said on Friday a data breach may have allowed malicious hacker(s) to gain access to the driver’s license numbers of roughly 50,000 of its drivers.
Kaspersky Lab announced a new initiative designed to support security startups and provide expertise and advice to foster much needed talent for the IT security industry.
UK-based TalkTalk, a telecommunications and broadband company, confirmed that it has suffered a data breach, which names, phone numbers, addressees and account numbers of its customers were exposed to malicious actors.
A steady stream of low-level cyber attacks poses the most likely danger to the United States rather than a potential digital "armageddon," US intelligence director James Clapper said.
Silent Circle has agreed to buy out the joint venture between Silent Circle and Geeksphone, giving Silent Circle a 100 percent ownership stake in SGP Technologies and full ownership of the privacy and security focused “Blackphone”.
ForeScout Technologies announced that it has named veteran security industry executive Michael P. DeCesare as its new chief executive officer.
Attackers are using Windows Management Instrumentation (WMI) and PowerShell to avoid detection and carry out broad commands on compromised systems, according to FireEye-owned Mandiant.
Sqrrl, a Cambridge, Mass.-based big data analytics startup with roots linked back to the NSA, announced that it has secured $7 million in a Series B founding round.
ENISA published a new report on the development of certification programs for ICS/SCADA cybersecurity professionals.
Industry professionals applauded the steps by the White House to promote cyber threat information sharing, but an executive order can only go so far and more is needed than just information sharing to combat sophisticated cyber attacks, experts said.

FEATURES, INSIGHTS // Management & Strategy

rss icon

Torsten George's picture
The transition from a compliance-driven check-box approach to a risk-based model, enables businesses to centralize the ongoing definition, evaluation, remediation, and analysis of their risk posture in a closed-loop process.
Joshua Goldfarb's picture
If you are a security leader, you owe it to yourself and to your organization to create a culture that rewards honesty and truthfulness. Otherwise, the house always wins.
Marc Solomon's picture
For modern businesses, security leadership needs to ascend even higher in the organization: to the boardroom.
Mark Hatton's picture
What are we to make of Hollywood’s latest obsession with all things cyber? Between the recently released movie, Blackhat, and the forthcoming CSI CYBER TV series, the powers that be have clearly decided this subject is exciting enough to attract an audience.
Jon-Louis Heimerl's picture
While you may have the greatest advantage if you know your enemy well, you are in the greatest peril if you do not know yourself well.
Torsten George's picture
Massive data breaches are raising doubts about whether organizations are investing their security dollars in the right areas.
Jason Polancich's picture
After seeing an adaptation of Thomas Pynchon’s Inherent Vice, the movie started making more sense to me than the threat intelligence market. Then it hit me.
Fahmida Y. Rashid's picture
Piper Jaffray's fourth annual CIO survey found that 75 percent of CIOs were expecting to increase their security spending in 2015. But are these security investments spent and utilized wisely?
Joshua Goldfarb's picture
The past few decades in the information security field have been dominated by passive failure. Clearly, not every new idea has merit, but those ideas that come about scientifically and methodically have tremendous potential to improve the state of security.
Scott Gainey's picture
Several financial analyst firms concluded extensive studies, surveying over a thousand CIOs and CSOs cumulatively, to gain a better understanding of how these breaches are impacting spending behaviors.