Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Equifax’s cybersecurity failings, including ignored vulnerability reports and executive credentials up for sale on the dark web, revealed following the breach [Read More]
Security ratings firm BitSight has partnered with CyberGRX to offer 360-degree view of third-party cyber risk. [Read More]
Trend Micro patches several vulnerabilities, including ones rated critical and high severity, in Mobile Security for Enterprise [Read More]
Equifax shares more details about the breach and how it was discovered by the company [Read More]
Equifax announced that its company’s Chief Security Officer and Chief Information Officer and are retiring effective immediately. [Read More]
Google has decided that starting with Chrome 63 resources delivered over FTP will be labeled “not secure” [Read More]
While the data stolen in the Equifax hack might be up for sale, scammers have also set up websites offering the data [Read More]
Senator Mark Warner has called for a federal investigation of credit rating agency Equifax after the company lost the personal data of 143 million customers to hackers. [Read More]
CEO Eugene Kaspersky will testify before Congress regarding the use of Kaspersky products by the U.S. government [Read More]
The Federal Trade Commission said it has begun an investigation into a massive data breach at credit bureau Equifax that may have leaked sensitive information on 143 million people. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Danelle Au's picture
How do you decide where to focus your security efforts to break the kill chain? Let’s take a look at three different approaches.
Justin Fier's picture
Facing up to the blinds spots of our networks will help us direct our strategies toward the automation and visibility that we desperately need to anticipate the onset of attackers, before they strike.
Joshua Goldfarb's picture
Security marketing seems to be stuck in a bit of a “spray and pray” rut. Perhaps the time has come for security vendors to rethink how they invest their marketing budgets?
Jack Danahy's picture
Jack Danahy, co-founder and CTO of Barkly, attempts to clarify what is and what is not machine learning in endpoint security
Rafal Los's picture
Optiv's Rafal Los shares some advice on how to build and cultivate relationships in infosec
Josh Lefkowitz's picture
Oil and gas is one of the critical infrastructure sectors that face greater risks and challenges when it comes to security
Preston Hogue's picture
Business leaders have become much more sophisticated in understanding IT, and they need bring that same level of sophistication to security.
Travis Greene's picture
Automation will play an ever-increasing role in IT security. Like all automation, it will result in greater productivity that will reduce the need for certain staff, but increase the need for others.
Ashley Arbuckle's picture
As with most new and challenging endeavors, you need to define a pragmatic approach to mastering hyper-connectivity, data integration, and machine learning.
Marc Solomon's picture
Automatically recalculating and reevaluating priorities and threat assessments ensures you continue to stay focused on what is relevant to mitigate your organization’s risk.