Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Facebook awarded a $50,000 Internet Defense Prize to a pair of German researchers with a seemingly viable approach to detecting vulnerabilities in Web applications.
FishNet Security has opened a new technology testing lab that allows partners and customers to vet technologies in a virtual IT environment using simulated network conditions and attack scenarios.
Deloitte's Cyber Risk Services group has launched new “cyber war-gaming and simulation services” that aim to unite those tasked with managing enterprise-wide responses to cyber-attacks.
Cisco has expanded its certification portfolio to include specialists in industrial networking and other fields.
Please join Palo Alto Networks and SecurityWeek on Wednesday, July 9th at 1:00 PM ET for an informative webcast on how your organization can better detect and prevent advanced cyber attacks.
The IEEE announced the launch of a new service designed to help the security industry respond more efficiently to the modern malware threat landscape.
The beauty of hackers, says cybersecurity expert Keren Elazari, is that they force us to evolve and improve. This talk was presented at an official TED conference in March 2014.
The Defense Advanced Research Projects Agency (DARPA) revealed on Tuesday that the final competition for its automated security systems development challenge will take place in 2016 at DEF CON.
Microsoft Ventures, in collaboration with Israel-based venture capital firm Jerusalem Venture Partners (JVP), has launched a new program at the accelerator in Tel Aviv, Israel, dedicated to cybersecurity startups.
A large majority of the IT security community seems to agree that preventing Chinese researchers from attending security conferences in the United States is a bad idea.

FEATURES, INSIGHTS // Training & Certification

rss icon

Jason Polancich's picture
Starting your own private ISAC is easier and more important long-term than you might think.
Marc Solomon's picture
While we can’t address security without technology, we also need to consider education. Organizations must also be committed to keeping their IT security staff highly trained on the current threat landscape and advanced approaches to security.
Mark Hatton's picture
Software and hardware alone are not enough to manage a massive enterprise security program. You need security professionals and experienced leaders who can keep the team (and the tools) operating effectively.
James McFarlin's picture
Launched in 2009, CyberPatriot began with eight high school cybersecurity teams competing for scholarships. In just six years, participation quickly expanded to more than 1500 teams around the world.
Mark Hatton's picture
Are we doing enough to ensure that we are cultivating the next generation of cyber professionals? Do we invest enough in education programs that so that students go on to institutions of higher learning with a goal of becoming a cybersecurity expert?
Marc Solomon's picture
Open source is a valuable tool for defenders as they work to close these gaps and to gather greater intelligence about potential threats to make better decisions and take action.
Danelle Au's picture
The most effective CISOs today can’t just be experts in security. Organizations need a versatile security leader that speaks a new language-- one that is a blend of technology and business.
Mark Hatton's picture
The following is a list of questions that I recommend everyone ask security vendors as an initial filter.
Chris Hinkley's picture
Without the internal and external safeguards working in conjunction, your vulnerability will spike and your performance will suffer as a by-product -- two things you can’t afford to have happen.
Matthew Stern's picture
Successful conduct of military operations requires a unit’s clear understanding of the battle space it controls and its “area of operations”. This includes not only the terrain of the battlefield but also the capabilities, motives, and determination of the enemy they face.