Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The beauty of hackers, says cybersecurity expert Keren Elazari, is that they force us to evolve and improve. This talk was presented at an official TED conference in March 2014.
The Defense Advanced Research Projects Agency (DARPA) revealed on Tuesday that the final competition for its automated security systems development challenge will take place in 2016 at DEF CON.
Microsoft Ventures, in collaboration with Israel-based venture capital firm Jerusalem Venture Partners (JVP), has launched a new program at the accelerator in Tel Aviv, Israel, dedicated to cybersecurity startups.
A large majority of the IT security community seems to agree that preventing Chinese researchers from attending security conferences in the United States is a bad idea.
Suits and Spooks New York will take place in New York City on June 20-21. We have a packed agenda of cutting-edge topics presented by speakers who have direct experience in combating security challenges on a daily basis.
Rapid7, a provider of security risk and penetration testing solutions, has launched certification programs for users of Nexpose and Metasploit Pro.
Healthcare organizations are still struggling with information sharing both internally and externally, participants in an industry-wide cyber-security exercise said.
Verizon expanded its 2014 Data Breach Investigations Report to include security incidents that didn't result in breaches and provided industry-by-industry analysis of various threat types.
Ben-Gurion University of the Negev has signed a $8.5 million agreement with the Israel National Cyber Bureau to develop CyberSpark, which includes a National Cyber Research Center adjacent to BGU’s campus.
The Cyber Security Research Alliance announced the selection of its first academic research partners who will work together to advance cyber physical system security in transportation vehicles, medical devices and the power grid.

FEATURES, INSIGHTS // Training & Certification

rss icon

James McFarlin's picture
Launched in 2009, CyberPatriot began with eight high school cybersecurity teams competing for scholarships. In just six years, participation quickly expanded to more than 1500 teams around the world.
Mark Hatton's picture
Are we doing enough to ensure that we are cultivating the next generation of cyber professionals? Do we invest enough in education programs that so that students go on to institutions of higher learning with a goal of becoming a cybersecurity expert?
Marc Solomon's picture
Open source is a valuable tool for defenders as they work to close these gaps and to gather greater intelligence about potential threats to make better decisions and take action.
Danelle Au's picture
The most effective CISOs today can’t just be experts in security. Organizations need a versatile security leader that speaks a new language-- one that is a blend of technology and business.
Mark Hatton's picture
The following is a list of questions that I recommend everyone ask security vendors as an initial filter.
Chris Hinkley's picture
Without the internal and external safeguards working in conjunction, your vulnerability will spike and your performance will suffer as a by-product -- two things you can’t afford to have happen.
Matthew Stern's picture
Successful conduct of military operations requires a unit’s clear understanding of the battle space it controls and its “area of operations”. This includes not only the terrain of the battlefield but also the capabilities, motives, and determination of the enemy they face.
Jon-Louis Heimerl's picture
In a perfect world, we would not stress this awareness for one month only. Awareness should be a constant, ongoing effort.
Chris Poulin's picture
Security should be a fascinating, dynamic, and creative pursuit. I say have fun, be creative, be criminal in your thoughts, but not your actions. The black hats who have you in their targets are having a blast.
Jon-Louis Heimerl's picture
External attacks are not our only worry. Most security nuts have been saying for years that our biggest threat is not external, but rather the "Internal Threat." I will take that a step further and say that one of the biggest threats that we face is the "oops".