Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Suits and Spooks New York occurs on June 20-21, 2014 at the Dream Downtown hotel in Chelsea. Register today for this one-of-a-kind event!
Seculert plays in the advanced threat protection market. SecurityWeek sat down with Dudi Matot, CEO and Co-founder to discuss the security startup.
TIBCO's LogLogic 5.5 provides IT businesses control with a centralized source for enterprise log and machine data, improving business agility and achieving cost savings.
The beauty of hackers, says cybersecurity expert Keren Elazari, is that they force us to evolve and improve. This talk was presented at an official TED conference in March 2014.
Absolute Software Corporation has appointed Geoff Haydon as Chief Executive Officer and as a member of the Board of Directors.
Data protection firm SafeNet announced that it has named Prakash Panjwani as the company’s new President and Chief Executive Officer.
Stealth security company vArmour announced on that it has named Tim Eades as chief executive officer.
Target Corp. announced on Tuesday that it has hired Brad Maiorino as senior vice president and chief information security officer (CISO).
CyberX has raised $2 million in an initial funding round led by Glilot Capital Partners, with participation from the Swarth Group, GlenRock, and angel investor Gigi Levy-Weiss.
The draft will be available for public comment until July 18.

FEATURES, INSIGHTS // Management & Strategy

rss icon

Mark Hatton's picture
The fact that you aren’t seeing or hearing about potential threats to the organization, or alarms aren’t being raised by the security team, shouldn’t make you feel better as an executive.
Jon-Louis Heimerl's picture
When it comes to the security responsibilities of vendors, answers are still often behind where they need to be. What are some things to think about in the way you manage your security with your vendors?
Marcus Ranum's picture
There's a lesson security people who want to establish metrics can learn from the poverty line: Sometimes it's hard to define what you're measuring...
Marc Solomon's picture
When evaluating managed security services the following five questions can help ensure you get the support you need to stay focused on the threat.
Mark Hatton's picture
Security really is a marathon and there are no days off. Sacrifices are needed and tough decisions are required. The motto of our country’s most elite fighting force, the US Navy SEALs, is The Only Easy Day Was Yesterday.
Chris Coleman's picture
The shaping of the threat intelligence management market is critical to its success, and there is much confusion about the very term “threat intelligence.” I am a firm believer that intelligence is a process, not an individual thing, and that Intelligence is not “done.” It is “created.”
Dr. Mike Lloyd's picture
The fact that insurance companies – well respected by every business-centric executive – look at cyber risk and say “no, thanks” is a pretty clear indicator that something is rotten...
Torsten George's picture
A threat is the agent that takes advantage of a vulnerability. This relationship must be a key factor in the risk assessment process and can no longer be treated as risk’s neglected step child.
Mark Hatton's picture
I am painfully aware that in business and in security, hope is not a plan. However, that doesn’t mean we can’t dream a bit about the best case scenario. In the spirit of the season, here are five things I’m hoping for in the security industry this year.
Wade Williamson's picture
As enterprises become increasingly focused on security, it’s important to take an honest look not just at what security measures are in place, but how they are really used.