Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Several organizations that use the GNU Bourne Again Shell (Bash) in their products have been hard at work producing software updates to address the recently discovered vulnerability dubbed "Shellshock" or "Bash Bug."
Symantec on Thursday announced that Michael A. Brown has been appointed as the company’s CEO, effective immediately.
Jeffrey Massimilla has been appointed chief product cybersecurity officer of General Motors.
Viator, the tour-booking company acquired this summer by TripAdvisor for $200 million, is notifying roughly 1.4 million customers that their payment card data and personal details might have been compromised following a data breach.
Microsoft has decided to shut down its Trustworthy Computing (TwC) unit that has been focusing on improving customers' trust in the company's commercial products.
What types of security solutions should have been used by Home Depot? What are best practices for avoiding such incidents? What steps should the retail industry take? These are just some of the questions answered by members of the security industry.
Google, Dropbox, the Open Technology Fund and several security researchers have joined forces for a new initiative that focuses on usable secure technologies.
The data breach affecting Home Depot locations across the United States and Canada is estimated to have affected 56 million customer payment cards between April and September 2014.
Many organizations are not preparing well for cyber-security incidents, according to a new survey.
Cyber risk intelligence company SurfWatch Labs has released a new application designed to provide C-level executives and board members with clear information on cyber risks faced by their company.

FEATURES, INSIGHTS // Management & Strategy

rss icon

Joshua Goldfarb's picture
Amidst recent headlines, I am concerned that as a security community, we are losing sight of an important principle that is very important to remember: not all intrusions involve malware.
Scott Gainey's picture
Corporate stewards are getting educated in a hurry and are gearing up to ask some very pointed questions regarding strategy for protecting company data.
Jason Polancich's picture
Businesses have more data on hand than they think. They key is crafting a plan to track it and combine it with data from outside their own walls against which the internal data can be analyzed.
James McFarlin's picture
One can only hope our nation’s alarm clocks wake up and stir our national leaders’ imaginations before a cyber incident of the magnitude of 9/11 results in the need for a “Cyber Strikes Commission Report.”
Joshua Goldfarb's picture
I am often asked the question: “Is security an unsolvable problem?” In order for me to answer that question, I would have to understand it, and I don’t.
Danelle Au's picture
Enterprises can gain tremendous competitive advantages by having IT focus on the things that matter – users and information rather than infrastructure maintenance and building.
Torsten George's picture
When an organization is solely focused on strengthening its compliance posture to pass an audit, they primarily look at control failures and gaps and try to mitigate them.
Mark Hatton's picture
You need to identify your security shortcomings before someone else does. Simulate attacks and tests to associate known vulnerabilities, previous attack patterns, and security/network data to identify potential attack paths to your company’s most important data.
Joshua Goldfarb's picture
An organization that keeps records of its security incidents should be able to study that data to understand the top ways in which it is generally becoming compromised.
Jason Polancich's picture
In order to make our ecosystem a safer place for all of us, small and large, the big guys out there are going to have to start - at least in part - handling the security of their small business partners, suppliers and customers.