Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Industry professionals applauded the steps by the White House to promote cyber threat information sharing, but an executive order can only go so far and more is needed than just information sharing to combat sophisticated cyber attacks, experts said.
Please join us on Tuesday, Feb. 3rd at 1PM ET for a special webcast: How To Avoid Being Tomorrow's Headline: Mitigating Insider Threats and Breaches, presented by Centrify.
Enterprises have identified the weak link in the chain in endpoint security - and if you are an end user, that weak link is probably you, according to a new survey.
Security experts discuss the implications of the new version of the Payment Card Industry Data Security Standard as the New Year dawns.
Security experts weigh in on what they would like to see in 2015 to make their jobs wrangling users, infrastructure, and data easier.
South Korea's nuclear power plant operator launched a two-day drill to test its ability to thwart a cyber attack, after a series of online information leaks by a suspected hacker.
Rapid7 announced that it has received $30 million in funding, bringing the total raised by the company to-date to $93 million.
Cyber risk assessment and data breach services company NetDiligence published a new study focusing on the costs incurred by insurance underwriters due to cyber incidents.
While Home Depot and Staples say cyber liability insurance will mitigate the financial impact of data breaches they suffered, adoption of cyber insurance generally appears to be mixed.
ENISA, Europe's Cyber security agency, has released two reports that aim to inform and guide decision makers in the public and private sector on the use and implementation of cryptographic protocols for securing personal data.

FEATURES, INSIGHTS // Risk Management

rss icon

Mark Hatton's picture
Unfortunately, when it comes to security, what you’ve accomplished means very little. It’s all about where the vulnerabilities still exist.
Jason Polancich's picture
Without a solid base in knowing who you are as a target and what’s going on around you at all times, everything else you do is essentially a half-measure.
Travis Greene's picture
No IT organization has a seemingly unlimited budget the way that Team Oracle did in the 2013 America’s Cup race. But look closer at why spending on America’s Cup racing seems so out of control and it starts to look a bit more familiar.
Rafal Los's picture
While serving as a security leader, how often have you heard or have yourself said, “If only the executives would pay attention to me?”
Torsten George's picture
How can companies deal with this challenge and transition to a model that uses more data to assess risks? One way is to implement cyber security operational risk management best practices.
Torsten George's picture
With the growing number of data breaches and a whole new set of security challenges facing companies, it’s time to re-examine the definition of IT risk management.
Joshua Goldfarb's picture
Tree rings occur when the growing season ends and growth stops. To avoid stagnation, a security organization must never stop growing.
Torsten George's picture
These four cyber security building blocks can help organizations can fulfill their requirements for quantitative risk reporting and neutralize the impact of cyber-attacks.
Joshua Goldfarb's picture
While intelligence is a critical component of a mature security program, it should not drive security. A risk-driven approach provides a much more comprehensive and scientific approach that allows organizations to keep pace with today’s sophisticated threats.
Rafal Los's picture
As long as the “hikers and bear” analogy is told in boardrooms we will have difficulty communicating the value of a proportionate security model where we design security measures for different types of adversaries with different types of objectives.