Security Experts:

Management & Strategy
long dotted


Microsoft rushes to patch serious remote code execution vulnerability found by Google researchers in Malware Protection Engine [Read More]
President Trump's cybersecurity executive order appears to build on the cybersecurity efforts already achieved by the previous administration and will promote an invaluable bi-partisan approach to the future of federal and critical infrastructure security. [Read More]
Yahoo has paid out more than $2 million for vulnerabilities since the launch of its bug bounty program in 2013 [Read More]
Critical unauthenticated remote code execution vulnerability patched in open source automation server Jenkins [Read More]
Google researchers find remote code execution vulnerability in Windows. Flaw described as “worst,” “crazy bad” and “wormable” [Read More]
WikiLeaks releases documents detailing Archimedes/Fulcrum, an MitM attack tool allegedly used by the CIA for targeting LANs [Read More]
Risks posed by SS7 flaws are no longer just theoretical – cybercriminals exploited vulnerabilities to steal money from bank accounts [Read More]
GDPR will affect all EU-based companies, and all US companies that have any trade with the EU. [Read More]
eDiscovery is already a complex issue, involving multiple departments and a mix of business and technology processes. It is going to get worse. [Read More]
Researchers tested the security of industrial robots and discovered that many machines can be hacked remotely [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Rafal Los's picture
If enterprise information security is to make stride in a positive direction we need less of the self-aggrandizing “expert” and more of those who can aggregate and distill tribal knowledge into wisdom.
Josh Lefkowitz's picture
Executive protection and physical security teams must leverage cyber threat intelligence to gain visibility into all relevant cyber and physical threats and ensure open collaboration and information sharing with all business functions.
Erin O’Malley's picture
In cybersecurity, basic hygiene is a must. You could implement every eye-catching security tool on the market, but without good, clean hygiene and the ability to deliver tools the right data at the right time, they’ll never shine their brightest.
Jennifer Blatnik's picture
If CISOs took a page from physicians and worked together to share missteps and move forward, they could gain crucial security learnings and prevent the spread of attacks.
Marc Solomon's picture
Companies can make their entire security infrastructure more effective by using this threat intelligence as the glue to integrate layers of point products within a defense-in-depth strategy.
Travis Greene's picture
If there are only five controls that a security organization can reasonably tackle this year, what should they be?
Torsten George's picture
Cyber security and cyber threats are most often confused with cyber risk, and often used interchangeably, but they are worlds apart.
Avi Chesla's picture
Security analysts are collecting all events, but are struggling to filter out non-relevant signals in an attempt to isolate the important events from the rest of the noise.
Jennifer Blatnik's picture
Every year, countless security vendors roam the show floor at RSA, promising that their latest revolutionary tool is going to solve the entire world’s security problems.
Scott Simkin's picture
While there were many amazing startups with great ideas at RSA this year, I fear they will struggle to convince new customers that “yet another dashboard” or source of threat analytics or intelligence is going to improve their cybersecurity posture.