Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Supervalu and Albertsons are notifying customers that information associated with their payment cards might have been stolen after hackers broke into systems that processes credit and debit card transactions.
Threat actors targeting Lockheed Martin immediately halted their cyberattacks against the defense contractor following the release of Mandiant’s APT1 report, Lockheed executives told SecurityWeek.
Private equity investment firm Thoma Bravo announced on Wednesday that it would take a significant equity investment in SailPoint, a provider of identity and access management (IAM) solutions.
NIST wants to build a reconfigurable cybersecurity testbed to provide guidance on the best practices for implementing security strategies within industrial control systems without negatively impacting process performance.
IBM has made another move to expand and enhance its Identity and Access Management (IAM) offerings, announcing that it has acquired the business operations of cloud-based IAM vendor Lighthouse Security Group.
In an open letter to Automotive industry CEOs, a group of security researchers called upon automobile manufacturers to build cyber-security safeguards inside the software systems powering various features in modern cars.
Hold Security that a group of cybercriminals from Russia dubbed managed to collect a total of 1.2 billion unique credentials after breaching the databases of roughly 420,000 websites from all over the world. The news and actions taken by Hold Security have been mixed. Here is what some people had to say.
European security firm Gemalto has agreed to buy data protection firm SafeNet for $890 million in cash.
Codenomicon has launched a new verification program designed to help critical systems manufacturers test the security and robustness of their products.
Hypervisors have become an important part of enterprise environments and while they should normally reduce the attack surface, experts warn that they can be plagued by security vulnerabilities that could be leveraged by malicious actors.

FEATURES, INSIGHTS // Management & Strategy

rss icon

Torsten George's picture
While the initial investment in a proof of concept can be costly, the end results might not only justify the additional expenses, but in the long-term save you money (and your job).
Mark Hatton's picture
Having a CISO not only solves the diffusion of responsibility problem by putting one person in charge, it also helps to transform the security culture in your organization.
Marcus Ranum's picture
There are two ways to start establishing security metrics. One is what I think of as the “bottom up” approach and the other being “top down”. For best results you might want to try a bit of both.
Marc Solomon's picture
With the right approach to security you can protect your organization’s sensitive information from both insiders and outsiders.
Aviv Raff's picture
While the phrase “cyber kill chain” is embedded in the cyber security vocabulary, many enterprises are still not proactive about keeping their assets, data, and reputations safe from bad actors.
Jon-Louis Heimerl's picture
Do people really understand what the U.S. Intelligence Community (IC) does and what classified information is? As someone who worked in the IC for about 10 years, here is an inside look.
Mark Hatton's picture
Are we doing enough to ensure that we are cultivating the next generation of cyber professionals? Do we invest enough in education programs that so that students go on to institutions of higher learning with a goal of becoming a cybersecurity expert?
Adam Ely's picture
CISOs are notoriously disliked. Trying to protect company, customer and employee data often means having to say “no” to new projects and implementations. This does not earn you many friends.
Torsten George's picture
In order to find the needle in the haystack, it is imperative to have all necessary data available to diagnose the patterns that point to an advanced persistent threat or sophisticated cyber-attack.
Joshua Goldfarb's picture
Understanding the challenges of information sharing up front can help organizations learn from the mistakes of others and build a more successful information sharing program.