Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

SecurityWeek’s 2016 CISO Forum will take place on June 1-2, 2016 at the Ritz Carlton, Half Moon Bay. [Read More]
SWIFT CEO Gottfried Leibbrandt revealed a five-point plan designed to harden SWIFT transactions following the $81 million theft via the Bangladesh central bank. [Read More]
F-Secure's "Rapid Detection Service" leverages both human and machine intelligence to provide an integrated intrusion detection and response service. [Read More]
Starting on June 16, 2016, the old SSLv3 and RC4 security protocols will no longer be supported on Google’s SMTP servers and on Gmail’s web servers. [Read More]
The full cache of secret documents from former US intelligence contractor Edward Snowden is being opened to journalists and organizations willing to work with the news organization holding the archive. [Read More]
The Electronic Frontier Foundation (EFF) on Thursday announced Certbot, a Let's Encrypt client designed to help websites encrypt their traffic. [Read More]
Tumblr resets the passwords of some users after email addresses and passwords from 2013 have been accessed [Read More]
Jeremiah Grossman joins Ryan Naraine to talk about the parallels between jiu-jitsu and computer security and the ongoing cat-and-mouse game between attackers and defenders. [Read More]
Wendy’s credit card breach affects roughly 300 of the company’s 5,500 franchise restaurants [Read More]
Should Clinton be charged with mishandling classified data, she would find herself in the unprecedented position of campaigning for president while embroiled in a legal battle and under federal indictment. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Adam Meyer's picture
All three types of intelligence help drive decisions and ultimately outcomes, but at different levels within the business.
Alastair Paterson's picture
By understanding the different types of incidents and the different returns, you can make a strong case for greater cyber situational awareness in the short- and long-term.
Jennifer Blatnik's picture
It is critical for business leadership to address the growing threat of ransomware as a business risk rather than a siloed IT issue.
Joshua Goldfarb's picture
Before we can understand the purpose of analysis within the greater incident response process, we need to better understand the decision-making process.
Scott Simkin's picture
Threat intelligence is only valuable if an organization takes the necessary steps to quickly and easily apply that intelligence to actual security policy.
Adam Meyer's picture
Gaining awareness of supply chain risks and addressing them in the context of broader risk management programs will put organizations in a much better position when it comes to managing their cyber risk.
Alastair Paterson's picture
Failure to secure sensitive information during the M&A process opens the door to threat actors looking to profit by exploiting financial markets and proprietary intellectual property (IP).
Joshua Goldfarb's picture
Cyber insurance, like any tool, will not solve all of an organization’s problems. But it can help an organization round out its risk mitigation strategy.
Bill Sweeney's picture
Enterprises have to worry about the surface area that is open for attack and the challenge of detecting attacks quickly when they are occurring. In every instance simplification will help.
Torsten George's picture
CISOs should pro-actively monitor their company’s risk posture and provide quantitative views of the organization’s risk posture on a semi-annual basis — at the very least.