Security Experts:

Management & Strategy
long dotted


U.S President Barack Obama announced a new non-partisan commission designed to gather input in order to strengthen cybersecurity in both the public and private sector in the United States. [Read More]
British Telecom (BT) said on Wednesday that it plans to hire 900 people across the globe to work in its cyber security business over the next 12 months. [Read More]
SecurityWeek talked to Symantec's Kevin Haley and asked him to highlight five specific areas of Symantec's Internet Security Threat Report 2016 (ISTR). [Read More]
SecureWorks plans to offer 9 million shares in an upcoming initial public offering (IPO) at a price between $15.50 and $17.50 per share. [Read More]
Recruitment remains a major problem for cyber security departments, and there seems to be no easy solution. [Read More]
A cyber-attack on the website of the Philippines Commission on Elections (Comelec) has resulted in personally identifiable information (PII) of around 55 million people being leaked online. [Read More]
Karamba Security comes out of stealth mode with ECU endpoint solution designed to protect connected cars against cyberattacks [Read More]
IBM has completed the acquisition of Resilient Systems, a privately-held company that offers an Incident Response Platform. [Read More]
In a recent survey, only 31 percent of respondents believe their vendor’s risk management program is highly effective, yet only 38 percent track the effectiveness of the vendor risk management program. [Read More]
European Union cybersecurity agency ENISA has urged decision makers in the EU to take action and create a cyber crisis management framework before a major incident occurs. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Tim Layton's picture
While we must continue to use defensive technologies because they help address the level of white noise that has become part of the cost to operate in our hyper-connected, digitized world, we can’t stop there.
Travis Greene's picture
Attended by roughly 40,000 people, RSA Conference 2016 was the biggest ever. Here are some observations on security trends observed at the event that took place last week at the conference.
Jack Danahy's picture
As the saying goes, don’t grocery shop when you’re hungry. If you do, you’re likely to end up with things you don’t need. The same rule should apply when shopping for security solutions.
Marc Solomon's picture
Through ongoing investigation and fine tuning tools and strategies, continuous incident response can improve your company’s overall security strategy and increase resiliency to attacks.
Joshua Goldfarb's picture
In security operations and incident response, we often hear about alert fatigue and lack of context, but what can be done to improve the situation?
Tal Be'ery's picture
A very plausible technical explanation to Linode/PagerDuty breach, is that the attackers abused Lish direct database access, to get access to other users’ credentials stored on the same database.
Torsten George's picture
Security metrics need to extend beyond quantitative factors to be able to more effectively measure and communicate the organization’s cyber risk posture as it relates to business goal.
Wade Williamson's picture
It is important to understand the realities behind data science and machine learning technologies so we can separate the truth from the hype and make well-informed security decisions.
Tim Layton's picture
The value of identifying your organization’s information out on the Dark Web can serve as a first-line indicator of a new breach that otherwise may go undetected for long periods of time.
Travis Greene's picture
As in politics, there are some numbers that are helpful, mandates to be met, and judgment calls to make when discussing an IT security budget that balances the extremes.