Security Experts:

Management & Strategy
long dotted


Despite all the spending on cybersecurity, attackers are the ones winning the security war. And unless things change dramatically on the defense side, the situation will get far worse, was the grim conclusion RAND Corporation researchers drew in their latest report.
DigiCert has acquired the CyberTrust Enterprise SSL business from Verizon Enterprise Solutions.
Fortinet announced that Judith Sim, chief marketing officer (CMO) at Oracle, is joining Fortinet's Board of Directors.
Rapid7 has filed an S-1 registration statement with the Securities and Exchange Commission for a proposed initial public offering (IPO) and is looking to raise roughly $80 million.
The US government agencies that defend the nation are in the midst of a charm offensive -- trying to win over the hearts and minds of Silicon Valley's tech workers.
Following disclosures of devastating breaches of US government computer networks, officials told lawmakers even more intrusions may be discovered with investigations and deployment of new security tools.
Size and geographical location don't matter when it comes to the maturity of an organization's security program, according to RSA's inaugural Cybersecurity Poverty Index.
According to a new study from the Ponemon Institute, IT security and IT leaders and their staff do not see eye to eye on security objectives.
Cyber risk intelligence company SurfWatch Labs launched SurfWatch Cyber Risk Cloud, an offering that allows organizations to compare their “evaluated cyber event data” to other sources of intelligence.
U.S. Office of Personnel Management (OPM) warned that hackers may have accessed the personal data of roughly four million federal employees.

FEATURES, INSIGHTS // Management & Strategy

rss icon

Rafal Los's picture
While serving as a security leader, how often have you heard or have yourself said, “If only the executives would pay attention to me?”
Torsten George's picture
How can companies deal with this challenge and transition to a model that uses more data to assess risks? One way is to implement cyber security operational risk management best practices.
Rafal Los's picture
Security leaders struggle to replicate successes from one enterprise to another largely because they are starting from scratch at every new turn.
Mark Hatton's picture
In the world of security, there is often a significant difference between perceived reality and what is actually happening, and the public’s perception of security within your organization can be just as important as reality.
Rafal Los's picture
Prioritizing is an unenviable job many security professionals must do every day – do you go live with a product on time, or do you hold it to fix that security bug which could cause a catastrophic failure?
Joshua Goldfarb's picture
The question of build or buy is not a new one, but it is one that does not adequately suit the implementation of a security solution.
Torsten George's picture
With the growing number of data breaches and a whole new set of security challenges facing companies, it’s time to re-examine the definition of IT risk management.
Joshua Goldfarb's picture
Tree rings occur when the growing season ends and growth stops. To avoid stagnation, a security organization must never stop growing.
Wade Williamson's picture
By building security controls that identify and correlate the malicious behaviors of an attack, we can begin to the tip the scales back in our favor.
Pat Calhoun's picture
While individual products and technologies are important weapons, they operate in a silo and lose sight of the bigger picture. The reality is that you can’t just rely on a single defense or a silver bullet.