Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

NYSE Governance Services, in partnership with Veracode, surveyed nearly 200 directors of public companies to discover how they view cybersecurity in the boardroom.
Fortinet has agreed to acquire Meru Networks (NASDAQ: MERU), a provider of enterprise wireless networking solutions, for roughly $44 million in cash.
Tech companies, civil liberties and privacy activists urged the White House to pull back efforts to weaken encryption or include law enforcement "backdoors" on technology products.
SecurityWeek invites you to participate in the 2015 SecurityWeek Golf Classic! Our first classic is being held at the prestigious world-class Ocean Course at Half Moon Bay, located just 23 miles from San Francisco International Airport.
A US appeals court ruled Thursday that the National Security Agency's massive collection of phone records of Americans is illegal, saying it exceeds the scope of what Congress authorized.
Cybereason, a Cambridge, Mass.-based provider of threat detection solutions, has closed a $25 million Series B funding round, with defense contractor Lockheed Martin participating as a strategic investor.
Rapid7, a Boston, Mass.-based provider of security analytics software and services, announced on Monday that it has acquired application security testing company NT OBJECTives (NTO).
Experts warned at a conference in Saudi Arabia of a critical shortage of global specialists trained to confront increasingly malicious cyber security threats.
Please join us for an interactive webcast on April 28 to learn how to improve the resiliency of your organization's strategic risk management and business operation.
US Defense Secretary Ashton Carter will head to Silicon Valley on Thursday in a bid to recruit tech gurus for the Pentagon, even if just on a part-time basis.

FEATURES, INSIGHTS // Management & Strategy

rss icon

Joshua Goldfarb's picture
The question of build or buy is not a new one, but it is one that does not adequately suit the implementation of a security solution.
Torsten George's picture
With the growing number of data breaches and a whole new set of security challenges facing companies, it’s time to re-examine the definition of IT risk management.
Joshua Goldfarb's picture
Tree rings occur when the growing season ends and growth stops. To avoid stagnation, a security organization must never stop growing.
Wade Williamson's picture
By building security controls that identify and correlate the malicious behaviors of an attack, we can begin to the tip the scales back in our favor.
Pat Calhoun's picture
While individual products and technologies are important weapons, they operate in a silo and lose sight of the bigger picture. The reality is that you can’t just rely on a single defense or a silver bullet.
Torsten George's picture
These four cyber security building blocks can help organizations can fulfill their requirements for quantitative risk reporting and neutralize the impact of cyber-attacks.
Jason Polancich's picture
We seem to be at a watershed moment in both the cybersecurity market and with our business cyber defense circumstances.
Marcus Ranum's picture
When you start keeping a long-term data series, remember that you can't change your algorithm for interpreting it on a regular basis.
Joshua Goldfarb's picture
While intelligence is a critical component of a mature security program, it should not drive security. A risk-driven approach provides a much more comprehensive and scientific approach that allows organizations to keep pace with today’s sophisticated threats.
Rafal Los's picture
As long as the “hikers and bear” analogy is told in boardrooms we will have difficulty communicating the value of a proportionate security model where we design security measures for different types of adversaries with different types of objectives.