Security Experts:

Management & Strategy
long dotted


Facebook has open sourced its capture the flag (CTF) platform to make security education more accessible [Read More]
British businesses have a high awareness of cybersecurity risk, but do relatively little about it, according to The Cyber Security Breaches Survey 2016. [Read More]
Blame for the February cyber theft of $81 million dollars from the Bangladesh central bank New York reserves in February has been levelled at SWIFT technicians by the investigating Bangladeshi police, which SWIFT rejects. [Read More]
Google informed some employees that their personal details were exposed by a third-party vendor [Read More]
Mossack Fonseca, the law firm at the heart of the Panama Papers scandal, issued a cease-and-desist letter to a journalists' collective urging it not to release online a trove of documents plundered from its computer servers. [Read More]
FireEye CEO David DeWalt will step down from the top position at the security firm, being replaced by current FireEye president Kevin Mandia. [Read More]
Qatar National Bank said that its systems are "fully secure" following a hacker attack that resulted in a large number of files allegedly stolen from the financial institution’s systems being leaked online. [Read More]
Symantec on said that President and Chief Executive Officer Michael Brown will be stepping down as head of the security firm after a successor has been appointed. [Read More]
Verizon has published its widely anticipated 2016 Data Breach Investigations Report (DBIR), compiled by Verizon with the support 67 contributing partners. [Read More]
The accounts of more than 7 million members of the Minecraft community “Lifeboat” have been exposed after a data breach in early 2016. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Johnnie Konstantas's picture
As NSA Chief Hacker Rob Joyce indicated during his recent talk at the Usenix Enigma conference, hackers are patient and persistent.
Alastair Paterson's picture
The kill chain should flow into a cycle, where an organization can learn lessons from an attack and ensure that future attempts at reconnaissance cannot use the same information, thereby reducing the attack surface.
Travis Greene's picture
It’s been said that the military is always preparing to fight the last war. Are we doing the same in IT security? Are we doomed to always react to the threat?
Marc Solomon's picture
To consistently and significantly reduce the median time to detection (TTD) we must combine sophisticated threat defenses with skilled security researchers.
Joshua Goldfarb's picture
In security, we have grown accustomed to treating the symptoms of our problems, rather than treating the problems themselves.
Rafal Los's picture
Some security organizations focus their energy on day-to-day fighting of security issues while others—a significantly smaller portion—sacrifice today’s operations for the ability to plan for tomorrow.
Wade Williamson's picture
Data science and machine learning models can assess large groups of cyber threats to find the subtle traits they have in common to better protect organizations.
Tim Layton's picture
While we must continue to use defensive technologies because they help address the level of white noise that has become part of the cost to operate in our hyper-connected, digitized world, we can’t stop there.
Travis Greene's picture
Attended by roughly 40,000 people, RSA Conference 2016 was the biggest ever. Here are some observations on security trends observed at the event that took place last week at the conference.
Jack Danahy's picture
As the saying goes, don’t grocery shop when you’re hungry. If you do, you’re likely to end up with things you don’t need. The same rule should apply when shopping for security solutions.