Security Experts:

Management & Strategy
long dotted


Hackers breached the Ubuntu Forums and managed to steal user data, but active passwords have not been accessed [Read More]
Bay Dynamics, a maker of cyber risk analytics software, has completed a $23 million Series B financing round led by Carrick Capital Partners. [Read More]
SWIFT has engaged the services of outside firms to complement its in-house cyber security expertise and support its information sharing initiative. [Read More]
Former FDIC CIO is accused of covering up several major data breaches, including attacks allegedly conducted by China [Read More]
Healthcare IT security firm Imprivata said on Wednesday that it has agreed to be acquired by an affiliate of private equity giant Thoma Bravo for roughly $544 million in cash. [Read More]
Threat Intelligence and research firm Flashpoint has raised $10 million in Series B funding, and expanded into the Business Risk Intelligence (BRI) market. [Read More]
Microsoft on Thursday announced a shake-up in its top ranks, including the departure of longtime chief operating officer Kevin Turner for a new job. [Read More]
Microsoft has published a paper that proposes a series of recommended 'norms' of good industry behavior in cyberspace, along with proposing a public-private body to attribute severe cyber attacks. [Read More]
The EU will invest €450 million in a new public-private partnership on cybersecurity that is expected to trigger €1.8 billion of investment by 2020. [Read More]
There are two primary security concerns over the 'Brexit'. Firstly that corporate security defenses will be weakened, and secondly that international threat intelligence sharing with Europe will diminish. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Adam Meyer's picture
Threat intelligence is all about reducing uncertainty. A threat intelligence plan should help you define why you are doing what you are doing from an intelligence perspective.
Alastair Paterson's picture
It's important to look at your environment through the eyes of an attacker to detect the threats and vulnerabilities relevant to your organization.
Torsten George's picture
Vulnerability assessments are often confused with penetration tests. In fact, the two terms are often used interchangeably, but they are worlds apart.
Joshua Goldfarb's picture
You’ll never see someone who solved their alert fatigue issues and runs an efficient security operations program on the six o’clock news. Hacking is sexy, but defending is an important piece of the security puzzle.
Ashley Arbuckle's picture
C-suite leaders should be thinking about cybersecurity as a strategic advantage that can set them apart from competitors.
Eddie Garcia's picture
One of the best use cases for big data is to use Hadoop for log ingestion and security analytics. Through audit, we can ensure that the security controls that are in place are working correctly and identify attempts to circumvent them.
Jennifer Blatnik's picture
It's been a dirty little secret among those of us in the security industry that there are two types of security solution providers...
Ken McAlpine's picture
While consuming, consolidating, and correlating information provides obvious benefits, always keep in mind how you and your organization can also contribute back to these information feeds.
Rafal Los's picture
With limited resources at your disposal, you as the security leader should work hard to make your team as efficient as possible.
Wade Williamson's picture
Collecting security data is relatively easy – the value of security analytics solutions will rest in how well they reduce that data into answers.