Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

The Delaware River and Bay Authority (DRBA) published a data security event notice on Friday to warn people who have made purchases at Cape May-Lewes Ferry terminals and vessels that their payment card data might have been compromised.
In an effort to address the global cybersecurity workforce gap, the Information Systems Security Association (ISSA) has launched a professional development framework.
The Federal Trade Commission (FTC), the agency whose goal is to protect America's consumers, has appointed Ashkan Soltani as chief technologist.
Staples said Tuesday it is investigating the possible theft of customer credit card files, a day after a security website reported the likely data breach.
The 2014 ICS Cyber Security Conference will address real world problems and discuss actual ICS cyber incidents, many of which have never been told before.
Researchers have found that the components of the FDT/DTM specification, designed to ease the management of industrial control systems (ICS) contains serious vulnerabilities.
Cybercrime costs are escalating for US companies and attacks are becoming more complicated to resolve, a study showed Wednesday.
Risk I/O has raised an additional $4 million as part of its Series A financing round, and has named Karim Toubba as chief executive officer.
Organization should know four things before going public about a breach: What happened, how it happened, what you are doing to prevent it from happening again, and what you are doing to protect people affected by the incident.
Several sophisticated threat groups have breached the systems of a major critical manufacturing company, the Department of Homeland Security (DHS) revealed in a report.

FEATURES, INSIGHTS // Management & Strategy

rss icon

Jason Polancich's picture
Collecting just a small amount of info regularly and diligently for your supply chain can not only help you secure your back doors, but the front entrances too.
Marc Solomon's picture
With the right information, security professionals can quickly pivot from detection to a full understanding of the scope of the outbreak and take action to head off wider compromises
Torsten George's picture
A risk-driven approach addresses both security posture and business impact to increase operational efficiency, improve assessment accuracy, reduce attack surfaces, and improve investment decision-making.
Joshua Goldfarb's picture
Getting to the root cause involves a level of understanding beyond that of simply identifying that a system in infected. We need to understand what specifically enabled or facilitated the infection.
Travis Greene's picture
The significant breaches of today are executed by people infiltrating the organization, and attackers are doing this by assuming identities or abusing insider privileges.
James McFarlin's picture
Launched in 2009, CyberPatriot began with eight high school cybersecurity teams competing for scholarships. In just six years, participation quickly expanded to more than 1500 teams around the world.
Joshua Goldfarb's picture
Amidst recent headlines, I am concerned that as a security community, we are losing sight of an important principle that is very important to remember: not all intrusions involve malware.
Scott Gainey's picture
Corporate stewards are getting educated in a hurry and are gearing up to ask some very pointed questions regarding strategy for protecting company data.
Jason Polancich's picture
Businesses have more data on hand than they think. They key is crafting a plan to track it and combine it with data from outside their own walls against which the internal data can be analyzed.
James McFarlin's picture
One can only hope our nation’s alarm clocks wake up and stir our national leaders’ imaginations before a cyber incident of the magnitude of 9/11 results in the need for a “Cyber Strikes Commission Report.”
view counter