Security Experts:

Management & Strategy
long dotted


The IEEE announced the launch of a new service designed to help the security industry respond more efficiently to the modern malware threat landscape.
With what may have been a subtle reference to former Target Stores CEO Greg Steinhafel, who lost his job from his handling of cyber attacks, speaker and panelist Rebecca Scorzato set the stage for her opening comments at July’s exceptional Suits & Spooks cybersecurity forum in New York.
Despite the headlines and repeated warnings, a recent survey suggests businesses still need to learn security lessons the hard way.
Taiwan tech giant Hon Hai said Wednesday it has pulled out of a deal to buy 4G equipment from Huawei after the government warned that the Chinese company posed a national security threat.
The Oil and Natural Gas industry unveiled a new Information Sharing and Analysis Center (ONG-ISAC) to facilitate the exchange of information, help evaluate risks, and provide up-to-date security guidance to U.S. companies.
Organizations need to expand their mobile worldview to include data leakage, insider threats, and mobile malware and develop incident response plans that consider mobile devices.
Internet fraud detection firm White Ops announced this week that it it has secured $7 million in funding from Paladin Capital and Grotech Ventures.
Systems and security management company Tanium announced that it has secured a massive $90 million in funding from Silicon Valley VC firm Andreessen Horowitz.
Microsoft has launched a limited preview of new security and threat information exchange platform that enables users to set up their own independent threat sharing communities to exchange information.
Suits and Spooks New York occurs on June 20-21, 2014 at the Dream Downtown hotel in Chelsea. Register today for this one-of-a-kind event!

FEATURES, INSIGHTS // Management & Strategy

rss icon

Torsten George's picture
Shortcomings in a cloud providers’ security architecture can trickle down to customers that leverage their services. So what steps should organizations take to retool their security practices for the cloud age?
Joshua Goldfarb's picture
When performing incident response, an organization should proceed through various stages by following its incident response process. While all stages are important, when an enterprise is attacked, the highest priority quickly becomes moving rapidly from detection to containment.
Mark Hatton's picture
The fact that you aren’t seeing or hearing about potential threats to the organization, or alarms aren’t being raised by the security team, shouldn’t make you feel better as an executive.
Jon-Louis Heimerl's picture
When it comes to the security responsibilities of vendors, answers are still often behind where they need to be. What are some things to think about in the way you manage your security with your vendors?
Marcus Ranum's picture
There's a lesson security people who want to establish metrics can learn from the poverty line: Sometimes it's hard to define what you're measuring...
Marc Solomon's picture
When evaluating managed security services the following five questions can help ensure you get the support you need to stay focused on the threat.
Mark Hatton's picture
Security really is a marathon and there are no days off. Sacrifices are needed and tough decisions are required. The motto of our country’s most elite fighting force, the US Navy SEALs, is The Only Easy Day Was Yesterday.
Chris Coleman's picture
The shaping of the threat intelligence management market is critical to its success, and there is much confusion about the very term “threat intelligence.” I am a firm believer that intelligence is a process, not an individual thing, and that Intelligence is not “done.” It is “created.”
Dr. Mike Lloyd's picture
The fact that insurance companies – well respected by every business-centric executive – look at cyber risk and say “no, thanks” is a pretty clear indicator that something is rotten...
Torsten George's picture
A threat is the agent that takes advantage of a vulnerability. This relationship must be a key factor in the risk assessment process and can no longer be treated as risk’s neglected step child.