Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Hackers stole the personal data of about 95,000 job seekers from McDonald's Canada recruitment website over the past three years. [Read More]
WikiLeaks publishes information and source code for framework used by CIA to make analysis of its tools and attribution more difficult [Read More]
Nearly 1.4 billion data records were compromised in 2016, according to Gemalto’s latest Breach Level Index [Read More]
FBI warns the healthcare industry that threat actors are targeting FTP servers that have anonymous authentication enabled [Read More]
A hacker gained access to the names, dates of birth and SSNs of job seekers in 10 U.S. states after breaching the systems of America’s JobLink (AJL) [Read More]
Google is displeased that Symantec failed to oversee issuance of certificates by its partners and wants Chrome to gradually distrust all current certificates [Read More]
The server hosting Android Forums was hacked and the website’s database was accessed. Only 2.5% of active users affected [Read More]
Apple’s initial analysis shows that the iPhone and Mac exploits disclosed by WikiLeaks have already been patched, and the company told WikiLeaks to submit vulnerabilities through the normal process [Read More]
WikiLeaks releases documents describing Apple device hacking tools used by the CIA. Most require physical access to the targeted device [Read More]
A 'Discussion Draft' bill called the Active Cyber Defense Certainty Act would remove parts of the CFAA that effectively prevent private business from taking their own action against hackers. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Steven Grossman's picture
When it comes to security and cyber risk, CISOs are in the middle of it all, but they are not alone in protecting the enterprise.
Marc Solomon's picture
There are strategies you can use so that the risk score is more relevant and useful within your specific environment.
Torsten George's picture
Let’s consider whether the proposed principles and tools by the World Economic Forum (WEF) can improve cyber resilience, and which types of enterprises can benefit most from implementing them.
Joshua Goldfarb's picture
Let’s take a look at the essential functions required to bring a mature security operations and incident response capability to the masses via a unified security operations platform.
Avi Chesla's picture
Correlating data points through more holistic analytic systems can help reveal the bigger picture and understand the real intent of an attack campaign.
Lance Cottrell's picture
Whether in a bar or in public, on the dark-web or a major news site, the lesson my Kung Fu instructor taught me on that first day can go a long way to keeping you safe.
Rafal Los's picture
When you’re solving problems it’s easy to get lost in creating something complicated. I believe that the more difficult path is to simplify, simplify, simplify.
Steven Grossman's picture
While we all dream of solving the skills shortage by completely automating the entire detection and response process, it is simply unlikely to happen in the foreseeable future.
Erin O’Malley's picture
Today, we expect ultimate convenience. But at what cost? More and more, I’m left wondering whether modern conveniences—grâce à today’s advanced technologies—are truly worth the risk.
Rafal Los's picture
Do you ever find yourself trying to protect your organization from exotic attack scenarios that are highly unlikely or that would have a minimal impact on you?