Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Online payments group PayPal announced Tuesday it was acquiring Israeli cybersecurity firm CyActive and establishing a new security hub in Israel.
President Barack Obama announced a new initiative today to bring more workers into the IT field.
Suits and Spooks London 2015 will be our first 2-day international event, and is jointly produced with TechUK, an association of over 850 companies that's funded by the British government.
Rapid7, a provider of security analytics software and services, announced on Tuesday that has launched a new services group dedicated to incident response.
Despite the focus on exotic zero-day exploits and sophisticated hacking techniques, IT teams are more concerned about more mundane risks to their organizations, such as risky employee behavior and cloud security.
Barracuda Networks has rebranded its eSignature product SignNow to CudaSign, and will offer the solution at just $1per user per month.
Network security firm Palo Alto Networks (NYSE: PANW) announced that total revenue for the fiscal second quarter ended January 31, 2015 grew 54 percent year-over-year to a record $217.7 million
Cloud-based security solutions provider Proofpoint has agreed to acquire threat intelligence provider Emerging Threats, for roughly $40 million in cash and stock.
Uber said on Friday a data breach may have allowed malicious hacker(s) to gain access to the driver’s license numbers of roughly 50,000 of its drivers.
Kaspersky Lab announced a new initiative designed to support security startups and provide expertise and advice to foster much needed talent for the IT security industry.

FEATURES, INSIGHTS // Management & Strategy

rss icon

Jason Polancich's picture
After seeing an adaptation of Thomas Pynchon’s Inherent Vice, the movie started making more sense to me than the threat intelligence market. Then it hit me.
Fahmida Y. Rashid's picture
Piper Jaffray's fourth annual CIO survey found that 75 percent of CIOs were expecting to increase their security spending in 2015. But are these security investments spent and utilized wisely?
Joshua Goldfarb's picture
The past few decades in the information security field have been dominated by passive failure. Clearly, not every new idea has merit, but those ideas that come about scientifically and methodically have tremendous potential to improve the state of security.
Scott Gainey's picture
Several financial analyst firms concluded extensive studies, surveying over a thousand CIOs and CSOs cumulatively, to gain a better understanding of how these breaches are impacting spending behaviors.
Torsten George's picture
With cyber criminals increasingly targeting third-party vendors to gain backdoor access to data at large, well-protected global organizations, security professionals need to rethink their vendor risk management practices.
Danelle Au's picture
A data breach plan lays out the key steps and the key personnel to involve when a data breach happens, and needs to incorporate three elements.
Joshua Goldfarb's picture
At a high level, "big data" and "security analytics" are about the two very different, somewhat diametrically opposed, but equally important concepts of collection and analysis.
Jason Polancich's picture
Most businesses today cannot say with any certainty how the cybersecurity tools or people they acquire and use align with their specific cyber problems.
Avi Chesla's picture
In order to be effective, security solutions must become more directly associated, in real-time, to cyber defense planning models.
Joshua Goldfarb's picture
Asking the right questions is one of the most important and fundamental aspects of a successful security program, and allows security teams to approach challenges analytically and logically.