Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Banking giant HSBC Turkey said that it recently identified a cyber attack targeting its credit card and debit card systems in Turkey.
Cyberthreat intelligence firm IID has hired Kelly Haggerty as the company’s Chief Product Officer, the company said Thursday.
BrowserStack, the cross-browser testing service, has provided more details on the attack in which a hacker gained access to information belonging to some of the company's customers.
Version of the 5.1 of Microsoft's Enhanced Mitigation Experience Toolkit (EMET) brings improved protection and addresses several application compatibility issues.
Juniper Networks CEO Shaygan Kheradpir has stepped down as chief executive officer and director at the Company after a review by the board of directors.
The US Postal Service said Monday hackers stole sensitive personal information from its employees in a large data breach this year, and got some customer data as well.
Central Dermatology Center of North Carolina said that one of its servers was breached by hackers back in August of 2012, but just became aware of the breach.
The Australian Signals Directorate is warning that cyber-criminals will target the upcoming G20 summit in Brisbane, saying they could include state-sanctioned hackers, trade spies or activists.
US cybersecurity firms have begun unprecedented levels of cooperation to shore up America's key computer networks, and some experts argue in favor of "hacking back".
Security firms Accuvant and FishNet Security announced on Wednesday that the two firms would join forces to create a new, yet to be named company.

FEATURES, INSIGHTS // Management & Strategy

rss icon

Mark Hatton's picture
Software and hardware alone are not enough to manage a massive enterprise security program. You need security professionals and experienced leaders who can keep the team (and the tools) operating effectively.
Jason Polancich's picture
Las Vegas has created a market-proven, repeatable formula for business success. For enterprises competing each and every day with cybercriminals, what if we were to apply these same principles to enterprise cybersecurity?
Joshua Goldfarb's picture
Proper visibility doesn’t have to mean a deluge of uncoordinated data sources. To security operations and incident response teams, the buzz and hype should be about “big value”, not “big data”.
Marcus Ranum's picture
A few years ago, there was a bit of discussion about improving security. A number of researchers' systems and faculty systems had been compromised, and “something must be done” - but what?
James McFarlin's picture
With risks to national and economic security increasing, other avenues of cyber defense are receiving attention. Improving resilience and the promising application of predictive analysis to the prevention of cyberattacks before they occur are two such areas
Rebecca Lawson's picture
There is a common misconception that in order to move to virtual security solutions, companies can, or should, replace physical security technologies they rely on to keep their networks safe today.
Mark Hatton's picture
it’s hard to build continuity under inconsistent leadership. It’s also really hard to beat the hackers when the person responsible for keeping them at bay has less job security than an NFL coach with a losing record.
Jason Polancich's picture
Collecting just a small amount of info regularly and diligently for your supply chain can not only help you secure your back doors, but the front entrances too.
Marc Solomon's picture
With the right information, security professionals can quickly pivot from detection to a full understanding of the scope of the outbreak and take action to head off wider compromises
Torsten George's picture
A risk-driven approach addresses both security posture and business impact to increase operational efficiency, improve assessment accuracy, reduce attack surfaces, and improve investment decision-making.