Security Experts:

Management & Strategy
long dotted


Digital Guardian, a Waltham, Mass.-based data protection solutions firm, has secured $66 million in additional financing. [Read More]
An anonymous group of hackers known as the Phantom Squad threatened to disrupt Sony’s PlayStation Network and Microsoft’s Xbox Live services around the Christmas holiday. [Read More]
LookingGlass Cyber Solutions, an Arlington, VA-based provider of threat intelligence solutions, has acquired open-source threat intelligence firm Cyveillance for $35 million in cash and raised $50 million in funding. [Read More]
Google will remove and distrust a Symantec root certificate from Chrome, Android and other products [Read More]
WordPress hosting service WP Engine hacked. Account passwords reset as precaution [Read More]
Hotel operator Wyndham settles FTC data breach charges without paying fine or admitting to any wrongdoing [Read More]
EU member states and lawmakers have clinched a deal to prevent cyber attacks by requiring Internet firms like eBay, Amazon and Google to boost their defenses and report breaches, officials said Tuesday. [Read More]
JD Wetherspoon website breached in June. Hackers gained access to a database containing the details of over 650,000 customers [Read More]
Symantec will invest $50 million to boost its cyber security services business globally, with a specific focus on the Asia-Pacific region. [Read More]
Educational toymaker VTech has confirmed that the recent data breach affects nearly 5 million customer accounts and more than 6 million kids profiles [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Alastair Paterson's picture
Cyber Threat Intelligence (CTI) is critical for organizations that want to gain a comprehensive, tailored and relevant view of the potential threats and types of attackers that could be targeting them.
Travis Greene's picture
The challenge in Information Security is recognizing how biases affect our judgment in evaluating and responding to threats and taking steps to mitigate them.
Danelle Au's picture
Attackers are thinking outside the box, using sophisticated breach methods and taking advantage of a very collaborative ecosystem. Perhaps it’s time to supplement all our security defenses with a hacker-centric security paradigm.
Jay Schulman's picture
The ability to recruit the right person for an application security role who can also find the flaws is a struggle for many organizations. These job openings rarely get filled.
Torsten George's picture
The DHS initiated the Continuous Diagnostics and Mitigation program to safeguard and secure Federal Information Technology networks. But can the DHS CDM program really strengthen the security posture of government networks?
Joshua Goldfarb's picture
Incident response is about taking action on those informed decisions. Once a threat is understood, it should be contained and remediated and security teams should respond quickly to minimize or eliminate damage to the organization.
Jason Polancich's picture
Companies that engage in periodic or annual cyber risk assessments and feel comfortable with results are flirting with disappointment - and maybe even disaster.
Bill Sweeney's picture
IT practitioners must learn to think, and communicate, like a board member. One opportunity for security leaders and CISOs to showcase their executive skills comes in the form of defending their budgets.
Rafal Los's picture
Everyone is talking about the shortage in security talent. Literally, everyone. It’s not for naught though, when you look at the sheer volume of open positions out there. We must have a talent shortage, right?
Torsten George's picture
The broad reach of GRC solutions creates a unique set of deployment challenges from both a technical and business perspective. This raises the question – how can organizations avoid common GRC pitfalls?