Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Microsoft finally announces decision on WoSign and StartCom certificates: new certificates issued after September 2017 will not be trusted [Read More]
Vulnerabilities found by a researcher in solar panels may allow hackers to disrupt power grids, but the affected vendor says his claims are greatly exaggerated [Read More]
Schneider Electric and industrial cybersecurity startup Claroty have teamed up to offer solutions for securing industrial infrastructure [Read More]
Eighty percent of SMBs respondents say it is likely that the business would use a third-party cyber security provider to manage security in 2017. [Read More]
Siemens warns customers that some of its medical imaging products are exposed to attacks due to Windows vulnerabilities exploited in the wild [Read More]
Vulnerability patched by Microsoft in June is company’s third attempt at patching old LNK flaw exploited by Stuxnet in 2010 [Read More]
Researchers warn that hackers can abuse GitHub and other Git repo hosting services for stealthy attacks on software developers [Read More]
WikiLeaks details tool used by the CIA to disable security cameras, mute microphones, and corrupt video recordings that could compromise its agents [Read More]
Following its agreement with Google, Symantec has decided to sell its certificate business to DigiCert for $950 million plus stock [Read More]
Bitdefender and Checkmarx publish reports describing vulnerabilities they found in popular Neo, VStarcam and Loftek IP cameras [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Marc Solomon's picture
Threat intelligence integration done right will allow you to act on threat intelligence efficiently and effectively using your existing security tools and services.
Torsten George's picture
The healthcare industry has experienced an onslaught of cyber-attacks over the last year, primarily driven by the fact that patient records are highly prized assets among cyber criminals.
Rafal Los's picture
Don’t overlook the importance of having something that’s repeatable. To be repeatable, a process must be well-documented, well-understood and well-practiced.
Joshua Goldfarb's picture
How exactly does reviewing the different markets in the security space bring this famous quote from “Romeo and Juliet” to mind?
Oliver Rochford's picture
Einstein is often quoted as having said that insanity is doing the same thing again and again and expecting a different result. When it comes to cybersecurity, based on that definition, we must all be insane.
Michael Moniz's picture
To be an outstanding cybersecurity professional, you need to think outside of the box, be intellectually curious, self-sufficient and collaborative.
Adam Meyer's picture
Business executives can benefit from strategic threat intelligence by gaining critical insights and establishing meaningful cybersecurity benchmarks.
Danelle Au's picture
When a vendor comes in for a presentation and, after only a few minutes, claims to know precisely what your challenges are and how to solve them, that’s a major red flag for the confident CISO.
Marc Solomon's picture
To harness the power embedded in disparate sources of threat data requires aggregating it and translating it into a uniform format for analysis and action.
Ashley Arbuckle's picture
In a globally interconnected world, knowledge-based economies are shaping our future, and vendor relationships are critical to success.