Security Experts:

Management & Strategy
long dotted


Payment industry giants MasterCard and Visa have joined forces to create of a new cross-industry group focused on enhancing payment system security.
FireEye is selling 14 million shares of its common stock at $82.00 per share in a follow-on public offering which will net the company roughly $460 million.
Target said that its chief information officer, Beth Jacob, has resigned effective immediately, after the massive data breach that occurred late last year.
Shares of Varonis are expected to begin trading on the NASDAQ on February 28, 2014, under the ticker symbol "VRNS".
Symantec has appointed Thomas Seifert as executive vice president and chief financial officer.
Conference organizers said that its 23rd annual event drew a record of more than 28,500 attendees.
Are schools and universities doing enough to prepare application developers to deal with IT security? One security expert says no.
The recently-disclosed data breach at Neiman Marcus has turned out to not be as bad as the company originally thought.
When it comes to securing a Linux machine, the answer is not installing an antivirus or some other security software. The key lies in hardening the operating system.
McAfee has shared details on a soon to be released threat sharing platform designed to help security teams develop and customize a threat intelligence solution from global data sources.

FEATURES, INSIGHTS // Management & Strategy

rss icon

Nimmy Reichenberg's picture
Most organizations today lack the tools and processes to assess and prioritize risks and vulnerabilities from the business perspective and end up defaulting to one of three approaches.
Danelle Au's picture
Zero Trust advocates for a segmented network, and security built into the architecture rather than an afterthought. It also advocates for some key principles built around the concept of “never trust, always verify”.
Michael Callahan's picture
The threats that companies face will continue to accelerate. And while that might seem like a very obvious and not so insightful observation, the devil is in the details. Here are the trends both in the threats and how we will respond to them in 2014.
Torsten George's picture
Without putting vulnerabilities into the context of the risk associated with them, organizations often misalign their remediation resources.
Jeff Hudson's picture
Making decisions based on anomalies is predicated by one very important assumption—you must understand what “normal” looks like.
Nimmy Reichenberg's picture
With the release of PCI-DSS 3.0, organizations have a framework for payment security as part of their business-as-usual activities by introducing more flexibility, and an increased focus on education, awareness and security as a shared responsibility.
Mark Hatton's picture
Complacency is never a good thing, but in security it can have devastating effects. While it’s good to acknowledge progress, that should never stand in the way of staying ahead of the next potential threat.
Gil Zimmermann's picture
As 2013 wanes, it makes sense take a few steps back and look at the state of the cloud and how it fits into the plans our customers and friends have been sharing with us. As we move through 2014, will your teams be driving new value, or responding to yesterday’s threats?
Torsten George's picture
What steps can be taken to implement and leverage incident response management as a valuable weapon for limiting material or reputational damages associated with data breaches?
Michael Callahan's picture
There are several steps companies can take on the server side to identify and disrupt brute force attacks.