Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

The US Justice Department filed a lawsuit against Edward Snowden seeking to prevent the former CIA employee and National Security Agency contractor from profiting from his new book. [Read More]
Industry professionals comment on a report that an unprotected database may have exposed the details of nearly everyone in Ecuador. [Read More]
Australia reportedly determined that China hacked its parliament and political parties, but decided not to make public accusations to avoid disrupting trade relations. [Read More]
Millions of Ecuadorians are at risk of identity theft because a security breach exposed a trove of data including names, phone numbers and birth dates. [Read More]
Edward Snowden, the National Security Agency contractor living in Russia after leaking information about the US government's mass surveillance program, has said he would like to return home if he can get a fair trial. [Read More]
Members of the Tor community have raised $86,081 as part of an initiative aimed at securing funds to find and squash bugs in the popular browser. [Read More]
Symantec notified more than 200 employees in the United States that they are being laid off as part of a recently announced restructuring plan for FY 2020. [Read More]
Whistleblower Edward Snowden, living in Russia since leaking a trove of classified documents showing the scope of post-9/11 US government surveillance, wants to claim asylum in France. [Read More]
A publicly accessible, unprotected database belonging to car dealership marketing firm Dealer Leads was found to expose 198 million records, including personally identifiable information. [Read More]
The US Treasury on Friday placed sanctions on three North Korea government-sponsored hacking operations which it said were behind the theft of possibly hundreds of millions of dollars and destructive cyber-attacks on infrastructure. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Jim Gordon's picture
Intel's Jim Gordon presents critical top 10 tactical action items every SMB should take to protect itself.
Gunter Ollmann's picture
Any bug hunter, security analyst, software vendor, or device manufacturer should not rely on CVSS as the pointy end of the stick for prioritizing remediation.
Marc Solomon's picture
Visualization holds the key for quickly understanding patterns and determining which threads to pull.
Torsten George's picture
While the urge to hack back after a data breach is very appealing, going back to the basics and applying proper cyber hygiene is a better alternative.
Joshua Goldfarb's picture
The Segway can offer us more security insight that we might initially realize. It is in this spirit that I offer five ways in which a Segway can instruct us as to how to improve our security programs and security postures.
Josh Lefkowitz's picture
No organization is fully immune to ransomware attacks, which is why having a comprehensive and well-tested incident response (IR) plan can make all the difference.
Stan Engelbrecht's picture
What does the cyber kill chain have to do with Sherlock Holmes, and this quote in particular?
Ashley Arbuckle's picture
While we can’t turn our attention away from gathering data, we must devise new ways to deal with the onslaught of data. Humans simply can’t keep up, and the problem is getting worse.
Marc Solomon's picture
The security market has become confusing and it is not about the product or technology to be used; it is about solving a specific problem.
Josh Lefkowitz's picture
Many businesses either don’t have a risk appetite statement, or they have one that was developed without input and guidance on cyber risk from the CISO.