Security Experts:

Management & Strategy
long dotted


US Defense Secretary Ashton Carter will head to Silicon Valley on Thursday in a bid to recruit tech gurus for the Pentagon, even if just on a part-time basis.
After agreeing to merge in late 2014, Accuvant and FishNet Security said the new combined company will be called Optiv Security.
Centrify has launched a new cloud-based identity management solution designed to address the needs of hybrid IT environments of on-premises and cloud-based systems.
US Homeland Security Secretary Jeh Johnson announced that his office is "finalizing plans to open up a satellite office in Silicon Valley, to serve as another point of contact with our friends here."
BlackBerry has agreed to acquire WatchDox, a Palo Alto, Calif.-based provider of enterprise solutions to access, share and protect sensitive documents, for an undisclosed sum.
Raytheon will contribute $1.9 billion (net of cash acquired) to acquire Websense, of which $600 million will be in the form of an intercompany loan to the yet to be named joint venture.
Fox-IT launches Cyberthreat Management Platform designed to help organizations strengthen intelligence, prevention, detection, and response operational capabilities.
WikiLeaks published thousands of documents on Thursday from last year's Sony hacking scandal, calling them an insight into the inner workings of a "secretive" firm.
WatchGuard Technologies announced that Prakash Panjwani has been named Chief Executive Officer (CEO) of the company.
Security research and product-testing firm NSS Labs announced today it has secured $7 Million in additional equity and debt funding.

FEATURES, INSIGHTS // Management & Strategy

rss icon

Marcus Ranum's picture
When you start keeping a long-term data series, remember that you can't change your algorithm for interpreting it on a regular basis.
Joshua Goldfarb's picture
While intelligence is a critical component of a mature security program, it should not drive security. A risk-driven approach provides a much more comprehensive and scientific approach that allows organizations to keep pace with today’s sophisticated threats.
Rafal Los's picture
As long as the “hikers and bear” analogy is told in boardrooms we will have difficulty communicating the value of a proportionate security model where we design security measures for different types of adversaries with different types of objectives.
Nate Kube's picture
Nate introduces various perspectives on cybersecurity as a moniker, shares some illuminating data, and presents a vernacular to move our field forward.
Torsten George's picture
The NIST Cybersecurity Framework is an important building block, but still just the first step towards implementing operationalized defenses against cyber security risks.
Jason Polancich's picture
If used properly, your cyber data itself can be a treasure trove of information that’s every bit as valuable - and effective - as a survey or a focus group.
Marc Solomon's picture
To help CISOs develop a manifesto, these five principles can serve as a baseline as they strive to become more dynamic in their approach to security, and more adaptive and innovative than adversaries.
Joshua Goldfarb's picture
Although home is where the heart is, it’s important to remember not to devote the overwhelming percentage of security resources to your home geographic area if that’s not where the overwhelming amount of your business and its assets are located.
Rafal Los's picture
As a security professional you must know the three categories of threats your organization faces, how to respond to each — and how to expend your resources.
Torsten George's picture
The transition from a compliance-driven check-box approach to a risk-based model, enables businesses to centralize the ongoing definition, evaluation, remediation, and analysis of their risk posture in a closed-loop process.