Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Cisco Systems has agreed to acquire privately held Neohapsis, a Chicago-based security advisory company providing information security, risk management, and compliance services, with a focus on cloud and mobile solutions.
Area 1 Security has raised $8 million in a Series A funding round led by Ted Schlein at Kleiner Perkins Caufield & Byers (KPCB).
Belden Inc. announced on Tuesday that it has signed a definitive agreement to acquire Tripwire, a provider of IT security and compliance solutions, for $710 million in cash.
New survey from Trustwave found more than one-fifth of respondents said their organization had no incident response plan in place.
Security industry experts provide reactions and insights into the damaging cyber attack against Sony that occurred in November 2014.
Cyber risk assessment and data breach services company NetDiligence published a new study focusing on the costs incurred by insurance underwriters due to cyber incidents.
According to a study conducted by EMC, enterprises employing more than 250 people lost a total of $1.7 trillion in the past year due to downtime and data loss.
The European Union Agency for Network and Information Security (ENISA) has published a framework designed to help government officials and policy practitioners evaluate National Cyber Security Strategies (NCSS).
Intel has acquired PasswordBox, a Montreal-based identity management service that enables users to log into websites and applications without having to type or remember passwords.
While Home Depot and Staples say cyber liability insurance will mitigate the financial impact of data breaches they suffered, adoption of cyber insurance generally appears to be mixed.

FEATURES, INSIGHTS // Management & Strategy

rss icon

Marcus Ranum's picture
To communicate about our metrics, we need ways that we can ground our experience in terms of “normal” for us; Otherwise, we really can't communicate our metrics effectively with anyone who isn't in a similar environment.
James McFarlin's picture
Whether Adm. Michael Rogers can capitalize on opportunities to pull together the teamwork necessary to shore up America’s cybersecurity is a game just begun.
Joshua Goldfarb's picture
When looking to measure the success and progress of a security program, it is important to think about what success and progress actually mean.
Jason Polancich's picture
Your employees, partners, customers and suppliers are your “survival group” battle-buddies now and it’s important to know how the zombies behave and where they hide.
James McFarlin's picture
A bountiful source of innovative new products for mature security providers lies in the hunting ground of promising newer firms.
Adam Firestone's picture
The imposition of externally-defined cybersecurity methodologies and solutions on both government and critical infrastructure programs hasn’t proven effective. Fortunately, the political and technical winds are shifting
Joshua Goldfarb's picture
As information security professionals, it is tempting to become enamored with the beauty or elegance of a technical solution, analytical technique, or investigative outcome.
James McFarlin's picture
Very little will get a board of directors’ attention as quickly as a cyber data breach with its attendant risks of damage to market capitalization, competitive advantage and brand reputation.
Mark Hatton's picture
Software and hardware alone are not enough to manage a massive enterprise security program. You need security professionals and experienced leaders who can keep the team (and the tools) operating effectively.
Jason Polancich's picture
Las Vegas has created a market-proven, repeatable formula for business success. For enterprises competing each and every day with cybercriminals, what if we were to apply these same principles to enterprise cybersecurity?