Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

In response to the massive Equifax breach, New York Governor Andrew Cuomo announced plans to make credit reporting firms comply with the 23 NYCRR 500 cybersecurity regulations. [Read More]
Equifax’s cybersecurity failings, including ignored vulnerability reports and executive credentials up for sale on the dark web, revealed following the breach [Read More]
Security ratings firm BitSight has partnered with CyberGRX to offer 360-degree view of third-party cyber risk. [Read More]
Trend Micro patches several vulnerabilities, including ones rated critical and high severity, in Mobile Security for Enterprise [Read More]
Equifax shares more details about the breach and how it was discovered by the company [Read More]
Equifax announced that its company’s Chief Security Officer and Chief Information Officer and are retiring effective immediately. [Read More]
Google has decided that starting with Chrome 63 resources delivered over FTP will be labeled “not secure” [Read More]
While the data stolen in the Equifax hack might be up for sale, scammers have also set up websites offering the data [Read More]
Senator Mark Warner has called for a federal investigation of credit rating agency Equifax after the company lost the personal data of 143 million customers to hackers. [Read More]
CEO Eugene Kaspersky will testify before Congress regarding the use of Kaspersky products by the U.S. government [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Joshua Goldfarb's picture
Benchmarking is about understanding how people use a variety of different products and services, what challenges they use them to address, and how those products and services fit into the organization’s security strategy.
Josh Lefkowitz's picture
Regardless of the extent to which your organization shares information, there’s a lot we can all learn from the WireX botnet takedown.
Rafal Los's picture
Rather than starting with a sound, business-aligned strategy supported by business-executive stakeholders there are far too many security organizations that just choose the “do something” path.
Adam Meyer's picture
Want to hire the best analyst? Then first define what is usable and then focus your search on those characteristics.
Alastair Paterson's picture
With greater awareness about POS system attacks, operations against third-party suppliers, and the vulnerabilities of public or semi-public Wi-Fi networks, companies can do a lot to mitigate risk and ensure safer journeys for travelers.
Travis Greene's picture
Operating with the assumption that you’ve already been hacked makes security incident response planning a priority for the organization.
Steven Grossman's picture
Why do we seem to need layer upon layer of regulation and guidance to try to ensure a more secure business world? Is it working?
Marc Solomon's picture
To more effectively prioritize to ensure relevance of threat intelligence, humans must be involved. After all, who understands your environment better than you?
Danelle Au's picture
How do you decide where to focus your security efforts to break the kill chain? Let’s take a look at three different approaches.
Justin Fier's picture
Facing up to the blinds spots of our networks will help us direct our strategies toward the automation and visibility that we desperately need to anticipate the onset of attackers, before they strike.