Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Pentagon addresses thousands of vulnerabilities reported by researchers through its bug bounty and vulnerability disclosure initiatives [Read More]
Quantum Dawn IV, a large-scale exercise to test the cyber resiliency of the U.S. finance sector, had more than 900 participants from over 50 financial institutions, government agencies and regulators. [Read More]
Equifax on Thursday said that during the third quarter of 2017, it incurred $87.5 million in expenses related to the massive hack that was disclosed on September 7, 2017. [Read More]
Microsoft releases security advisory on how users can protect themselves against attacks leveraging DDE [Read More]
Hundreds of apps that use Twilio SDK or REST API include hardcoded credentials that can be used to access millions of calls and text messages [Read More]
The recently disclosed crypto flaw affecting Infineon chips takes less time to exploit than initially believed [Read More]
A vulnerability allows hackers to cause some Brother printers to enter a DoS condition. Thousands of devices vulnerable to remote attacks [Read More]
Equifax said Friday an internal review found that four executives who sold shares ahead of disclosure of a massive data breach at the credit agency were unaware of the incident ahead of the sale. [Read More]
Savitech drivers used by several companies that provide specialized audio products expose PCs to attacks by installing a new root certificate [Read More]
The average enterprise now uses 1,232 cloud apps (up 33% from the second half of last year), while CIOs still believe their organizations use between just 30 and 40 cloud apps and services. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Adam Meyer's picture
Threat intelligence playbooks that support strategic and operational levels help teams be more effective, more certain in their actions and allow security programs to be agile/maintained as situations change.
Alastair Paterson's picture
The Equifax breach has had a damaging impact on the company and has put its customers at risk. But it has also served as a wake-up call for organizations around the globe.
Rafal Los's picture
With the many strategy development workshops in which I’ve successfully engaged, it’s hard to believe how many companies struggle with stakeholders as a starting point.
Justin Fier's picture
When third-parties are integrated onto the network, threats are bound to slip through the cracks, and the Equifax hack demonstrated how easy it is for a subtle threat to develop into a debilitating data breach.
Travis Greene's picture
If awareness isn’t working to change the behavior of employees and consumers, is there anything that can be done?
Preston Hogue's picture
As security professionals, it’s on us to understand the business implications of those conveniences and the impact they may have.
Joshua Goldfarb's picture
A seat at the security table should not be for only the elite and largest of businesses or security vendors. The time has come to democratize security.
Josh Lefkowitz's picture
Business Risk Intelligence (BRI) can help inform their decisions, gain a decision advantage over adversaries, and mitigate a broad spectrum of cyber and physical risks.
Lance Cottrell's picture
While mergers and acquisitions (M&A) are generally known for bringing economic growth and opportunity, people are beginning to realize that the process also brings serious cybersecurity risks.
Marc Solomon's picture
With the sheer volume of threat data continuing to climb at a staggering rate, security teams need to start with the threat – automating how we gather, score and prioritize threat intelligence.