Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Uber said on Friday a data breach may have allowed malicious hacker(s) to gain access to the driver’s license numbers of roughly 50,000 of its drivers.
Kaspersky Lab announced a new initiative designed to support security startups and provide expertise and advice to foster much needed talent for the IT security industry.
UK-based TalkTalk, a telecommunications and broadband company, confirmed that it has suffered a data breach, which names, phone numbers, addressees and account numbers of its customers were exposed to malicious actors.
A steady stream of low-level cyber attacks poses the most likely danger to the United States rather than a potential digital "armageddon," US intelligence director James Clapper said.
Silent Circle has agreed to buy out the joint venture between Silent Circle and Geeksphone, giving Silent Circle a 100 percent ownership stake in SGP Technologies and full ownership of the privacy and security focused “Blackphone”.
ForeScout Technologies announced that it has named veteran security industry executive Michael P. DeCesare as its new chief executive officer.
Attackers are using Windows Management Instrumentation (WMI) and PowerShell to avoid detection and carry out broad commands on compromised systems, according to FireEye-owned Mandiant.
Sqrrl, a Cambridge, Mass.-based big data analytics startup with roots linked back to the NSA, announced that it has secured $7 million in a Series B founding round.
ENISA published a new report on the development of certification programs for ICS/SCADA cybersecurity professionals.
Industry professionals applauded the steps by the White House to promote cyber threat information sharing, but an executive order can only go so far and more is needed than just information sharing to combat sophisticated cyber attacks, experts said.

FEATURES, INSIGHTS // Management & Strategy

rss icon

Danelle Au's picture
A data breach plan lays out the key steps and the key personnel to involve when a data breach happens, and needs to incorporate three elements.
Joshua Goldfarb's picture
At a high level, "big data" and "security analytics" are about the two very different, somewhat diametrically opposed, but equally important concepts of collection and analysis.
Jason Polancich's picture
Most businesses today cannot say with any certainty how the cybersecurity tools or people they acquire and use align with their specific cyber problems.
Avi Chesla's picture
In order to be effective, security solutions must become more directly associated, in real-time, to cyber defense planning models.
Joshua Goldfarb's picture
Asking the right questions is one of the most important and fundamental aspects of a successful security program, and allows security teams to approach challenges analytically and logically.
Torsten George's picture
2015 will prove to be a challenging year for IT security professionals. So, what can we expect in the next 12 months?
Jon-Louis Heimerl's picture
Based on high level review of the types of breaches we have seen over the past year, we should be able to see opportunities to make our environments more resilient to attack.
James McFarlin's picture
If North Korea is connected to the Sony attacks, it would be an archetypal example of such a weaker state using cyber operations to level the playing field in potential confrontations with the United States.
Adam Firestone's picture
Security requirements for information assurance, risk management, and certification and accreditation constrain Government organizations with respect to software allowed on Government networks.
Joshua Goldfarb's picture
In resource-limited environments, every alert counts. Spear alerting is an approach that can help organizations improve their signal-to-noise ratio and make their security programs much more efficient and effective.