Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

St. Jude Medical has patched some of the vulnerabilities found by MedSec, but the vendor insists the risk of cyberattacks is extremely low [Read More]
New York Governor Andrew Cuomo has introduced new cyber security proposals to his January State of the State address. [Read More]
An open source tool called “Truffle Hog” helps developers check if they’ve accidentally leaked any secret keys on GitHub [Read More]
According to a new survey, 95% of organizations have faced issues in implementing their chosen cybersecurity framework. [Read More]
The Commonwealth of Massachusetts has made its Data Breach Notification Archive publicly available online. [Read More]
The reports that a hacker breached FBI systems using a Plone zero-day exploit are likely false, said the developers of the CMS [Read More]
Netgear launches bug bounty program with payouts of up to $15,000 for vulnerabilities found in routers, cameras and Wi-Fi systems [Read More]
Smart electricity meters continue to pose a serious cybersecurity risk to consumers and utilities. But can hacking lead to explosions? [Read More]
US government subcontractor inadvertently leaks information on military healthcare workers [Read More]
The recently released Joint Analysis Report (JAR) published by the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) to detail tools used by Russian hackers in cyber attacks against the United States election didn’t deliver on its promise, security experts argue. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Ashley Arbuckle's picture
There’s a lot organizations can do to strengthen their incident response capabilities so that they’re up to the test. Here are a few ways to take charge and ensure a better outcome...
Joshua Goldfarb's picture
Defenders must think more broadly about the risk they're trying to mitigate, rather than getting distracted and instituting one-off policies and solutions to new means that may arise.
Torsten George's picture
Faced with hundreds, thousands, and even hundreds of thousands of vulnerabilities across their IT infrastructures leaves security practitioners at a virtually insurmountable disadvantage.
Marc Solomon's picture
Threat intelligence that incorporates external and internal data can go a long way toward helping you mitigate breaches during the holiday shopping frenzy.
Travis Greene's picture
Unlike the political arena, or even other divisions of the technology industry, when working in IT security, people rarely notice when everything is done perfectly.
Avi Chesla's picture
It's time to consider whether proactive defense strategies exist in the realm of real battlefields.
Scott Simkin's picture
Don’t expect to plug a cybersecurity specialist into the role of threat intelligence analyst, as the jobs require different skill sets.
Adam Meyer's picture
Cyber threat intelligence can help further optimize your incident response processes so that you can not only respond faster and better, but also reduce adversary opportunity and in turn go through fewer incident response fire drills.
Josh Lefkowitz's picture
The pivotal role of cybersecurity during the recent United States presidential election has underscored the critical need to focus on a secure electoral process.
Eddie Garcia's picture
To reduce the chances of falling victim to an insider-driven breach, security and risk professionals should start by learning what their available data can tell them.