Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Google says it has seen a drop in the number of warnings sent for potential government-backed phishing or malware attempts last year, mainly due to improved protection systems. [Read More]
U.S. Sen. Mark Warner has sent letters to six Internet networking device vendors urging them to ensure that their products remain secure during the COVID-19 social distancing efforts. [Read More]
GitHub this week announced that it has paid out over $1 million in rewards to the security researchers participating in its bug bounty program on HackerOne. [Read More]
A hacker has stolen files related to some AMD GPUs and they plan on making them all public unless they get paid. [Read More]
Log management platform Humio this week announced that it closed a $20 million Series B funding round, bringing the total investment raised to date to $32 million. [Read More]
Apple this week announced that third-party cookies are now blocked by default in Safari on macOS, iOS and iPadOS. [Read More]
A global survey of 1,000 IT security professionals has revealed that over 70% would rather protect corporate networks than industrial organizations. [Read More]
Investors and industry professionals discuss the impact of the COVID-19 coronavirus pandemic on early-stage venture investment in cybersecurity. [Read More]
Hundreds of publicly available ICS hacking tools, many of which have been developed by researchers, lower the bar for threat actors looking to target OT networks, FireEye warns. [Read More]
GE says the personal information of some employees may have been compromised as a result of a data breach suffered by Canon Business Process Services. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Gunter Ollmann's picture
Cyber range scenarios provide real insights into an organization’s capabilities and resilience against threats, along with the confidence to tackle them when they occur.
Marc Solomon's picture
It’s up to humans, guided by instinct, intelligence and experience, to determine the right data, so they can focus on what matters to the organization, make better decisions and take the right actions.
Laurence Pitt's picture
We’ve seen a shift away from ‘common themes’ across the RSA Conference to real development in plenty of new areas that truly advance cybersecurity.
Joshua Goldfarb's picture
How many times have you met someone full of promises and big on talk, only to be disappointed by what results from your engagement with them.
Marc Solomon's picture
When you’re at RSAC next week remember the “Human Element” is a great lens through which you can view and help assess the value of companies you partner with for security.
Laurence Pitt's picture
What can we do in order to prevent the spread of fake content or reduce the risk of a targeted use of Deepfakes that could cause damage to our organization?
Joshua Goldfarb's picture
Gap analysis can serve as a wonderful driver for improving security metrics if the security team understands how to seize the opportunity it presents.
Gunter Ollmann's picture
While defense scoring lowers the barrier to sharing defensive success insights, it does not yet address the insights gained from learning from others’ failures and the stigma of a breach.
AJ Nash's picture
Elevating from the Cyber threat intelligence (CTI) team concept to an “intelligence team” concept is the next generation of intelligence practice within the private sector.
Marc Solomon's picture
Threat intelligence value comes down to relevance and accessibility, which requires curation into a customized enrichment source, aggregating data filtered by a range of factors.