Security Experts:

Management & Strategy
long dotted


Cisco has agreed to acquire privately held, UK-based Portcullis, a consultancy that provides cybersecurity services to enterprise and government sector clients.
Raytheon has been awarded a new cybersecurity contract with the Department of Homeland Security (DHS) that could be worth approximately $1 billion.
Airbus Defence and Space has struck a strategic partnership with French IT service company Atos to develop security systems against computer attacks.
Splunk released Splunk Enterprise Security 4.0 (formerly Splunk App for Enterprise Security) and Splunk User Behavior Analytics (UBA) security solutions.
Seculert has appointed Richard Greene as its new Chief Executive Officer, replacing Co-Founder Dudi Matot, who will remain with the company as President.
Red Hat warned users on Thursday that it detected an intrusion on two websites related to Ceph, the company’s open source distributed storage platform.
Microsoft signed a Government Security Program (GSP) agreement with the NATO Communications and Information Agency (NCI Agency), a new step in a 12-year cybersecurity relationship between the two.
John McAfee, a software pioneer who later became a fugitive from justice in Central America, unveiled plans Wednesday to run for the US presidency.
Microsoft has acquired Adallom, an Israeli security startup that helps organizations protect data in cloud applications.
Systems and security management company Tanium has raised an additional $120 million in funding from a handful of investors, bringing the total raised by the software maker to $262 million.

FEATURES, INSIGHTS // Management & Strategy

rss icon

Alan Cohen's picture
Insecurity of any time stems from a common psychological cause -- fear. Fear is generally a reaction to something immediate that threatens your security or safety. Fear itself can harm one’s judgment and prevent teams from taking action.
Joshua Goldfarb's picture
Rather than proceed step by step through the process of building and maturing a security operations function, security teams often want to move immediately into very advanced topics.
Travis Greene's picture
In the case of Hilary Clinton's personal email server, we know that Top Secret information was transmitted over a network that likely wasn’t equipped to safeguard it. If her server was a target of foreign state actors, the implications are frightening.
Torsten George's picture
Organizations that address certain inhibitors to risk management head-on, can significantly reduce the time it takes to produce risk profiles.
Wade Williamson's picture
In security circles, 2014 was known colloquially as “the year of the breach.” However, 2015 almost doubled the 2014 tally of breached records, and has done so in the first eight months.
Joshua Goldfarb's picture
The way in which we as a security community seem to be approaching the topic of information sharing seems backward to me.
Rafal Los's picture
Security people who jump into troubled security organizations to help right the ship put their careers on the line and personal aspirations on hold, and their families take a temporary back seat.
Travis Greene's picture
As much fun as it is to wake up to patches waiting to be unwrapped, we don’t want the regret of “exploit Wednesday”, which is far more embarrassing than becoming a victim of a zero-day exploit.
Joshua Goldfarb's picture
Detection is a philosophy, approach, and methodology that seeks to identify suspicious or malicious behaviors matching risks and threats the organization is concerned about.
Torsten George's picture
Some insurers are citing litigation and poor operations as reasons not to payout on losses.