Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Embry-Riddle Aeronautical University's Prescott, Ariz., campus is launching what the University is calling its College of Security and Intelligence (CSI).
In its Global Threat Report, CrowdStrike identified many of the tactics, techniques, and procedures used by more than 50 different threat actor groups to craft and launch sophisticated attacks against major targets around the world.
Cisco announced a major revision of the CCNP Security Certification, and introduced a new Cybersecurity Specialist Certification, along with other security solutions training programs.
FireEye's acquisition of Mandiant and last month's acquisition of Norman Shark by Blue Coat Systems reflect the growing awareness among enterprises that they need sophisticated security technologies which go beyond antivirus and traditional perimeter-based defenses.
Industry-wide cyber attack exercises (CyberRX) will examine broad and segment-specific threats targeting information systems, medical devices and other essential technology resources of the healthcare industry.
As organizations search for solutions to protect their networks, data centers, and computer systems, an unexpected threat may be lurking under the surface—senior management.
Keeping to tradition, SecurityWeek invited security experts to weigh in on New Year's resolutions for improving information security and how organizations can better develop new habits in 2014.
Organizations can draw lessons from the Target data breach by considering various attack scenarios such as card readers which have been tampered with, POS systems infected with malware, and insider threats.
Please join Trend Micro and SecurityWeek on Thursday, Dec. 5th at Ruth's Chris Steakhouse in Bellevue, WA for an interactive security event with great food and open bar!
Please join Trend Micro and SecurityWeek on Thursday, Dec. 5th at Ruth's Chris Steakhouse in Bellevue, WA for an interactive security event with great food and open bar!

FEATURES, INSIGHTS // Training & Certification

rss icon

Marc Solomon's picture
Open source is a valuable tool for defenders as they work to close these gaps and to gather greater intelligence about potential threats to make better decisions and take action.
Danelle Au's picture
The most effective CISOs today can’t just be experts in security. Organizations need a versatile security leader that speaks a new language-- one that is a blend of technology and business.
Mark Hatton's picture
The following is a list of questions that I recommend everyone ask security vendors as an initial filter.
Chris Hinkley's picture
Without the internal and external safeguards working in conjunction, your vulnerability will spike and your performance will suffer as a by-product -- two things you can’t afford to have happen.
Matthew Stern's picture
Successful conduct of military operations requires a unit’s clear understanding of the battle space it controls and its “area of operations”. This includes not only the terrain of the battlefield but also the capabilities, motives, and determination of the enemy they face.
Jon-Louis Heimerl's picture
In a perfect world, we would not stress this awareness for one month only. Awareness should be a constant, ongoing effort.
Chris Poulin's picture
Security should be a fascinating, dynamic, and creative pursuit. I say have fun, be creative, be criminal in your thoughts, but not your actions. The black hats who have you in their targets are having a blast.
Jon-Louis Heimerl's picture
External attacks are not our only worry. Most security nuts have been saying for years that our biggest threat is not external, but rather the "Internal Threat." I will take that a step further and say that one of the biggest threats that we face is the "oops".
Oliver Rochford's picture
Oliver makes the case for why the way that security awareness training is often approached is flawed. But if done in the right way, Security Awareness Training can provide a lot of value and benefit the security posture greatly.
Oliver Rochford's picture
In addition to being a renowned theoretical physicist, Einstein was also a wizard at writing security procedures and processes. Here is a short selection of quotes from Albert Einstein, and why they are worthwhile when thinking about security.