Security Experts:

Management & Strategy
long dotted


LookingGlass Cyber Solutions has acquired botnet monitoring firm Kleissner and Associates (K&A) for an undisclosed sum.
The director of the US Office of Personnel Management resigned Friday after a devastating hack of government databases that saw the personal information of millions of federal workers and contractors stolen.
TrapX Security has raised $9 million in its Series B round, led by investors Intel Capital and Liberty Israel Venture Fund together with current investors BRM Group and Opus Capital.
Splunk, a provider of software that helps organizations gather and make use of machine data from a various sources, announced on Thursday that is has acquired Caspida, a maker of machine learning and behavioral analytics software.
Cisco said on Tuesday that it would pay roughly $635 million to acquire San Francisco-based OpenDNS
Venafi, a Salt Lake City, Utah-based provider of enterprise key and certificate management solutions, received $39 million in additional funding.
The official Call for Papers for the 2015 Industrial Control Systems (ICS) Cyber Security Conference, to be held October 26 – 29, 2015 at the Georgia Tech Hotel and Conference Center in Atlanta is now open.
Tanium has added a new module for its Endpoint Platform that helps organizations understand the origin, scope and cause of a cyber attack across millions of endpoints in seconds.
Yahoo! Chief Information Security Officer (CISO) Alex Stamos said on Wednesday night that he will be leaving the iconic Internet company to take on the role of Chief Security Officer (CSO) at Facebook.
Despite all the spending on cybersecurity, attackers are the ones winning the security war. And unless things change dramatically on the defense side, the situation will get far worse, was the grim conclusion RAND Corporation researchers drew in their latest report.

FEATURES, INSIGHTS // Management & Strategy

rss icon

Scott Gainey's picture
Organizations are asking the question – how much do I really need to spend on security in order to tip the scales in my favor? In order to answer that question you must first quantify the impact and risk of a cyber attack.
Joshua Goldfarb's picture
When rock stars use their platforms to harp on populist issues or bring attention to themselves or their agendas, it comes at the expense of all of these challenges. In my view, this does not help advance the state of security.
Fahmida Y. Rashid's picture
A CISO's job is on the line after a data breach, even if he or she had no authority to make changes or implement necessary plans.
Torsten George's picture
In response to the uptick in cyber-attacks, legislators and industry governing bodies alike have started to revise their guidelines to emphasize the implementation of a pro-active, risk-based approach to security over the traditional check-box mentality.
Rafal Los's picture
Every good leader, security or otherwise, builds out a strategy to set a direction and goals, with guidelines for execution and maybe even a way to measure success.
Joshua Goldfarb's picture
Security is most definitely a stressful business. It’s all too easy to get caught up in day-to-day activities and to forget to come up for air.
Alan Cohen's picture
Cyber security is a nation-first, vendor-second issue. Recent events have frighteningly underscored the requirement to fundamentally rethink our approach to information security lest our economy, our very way of life suffer drastically.
Rafal Los's picture
Often times it’s the insiders that enable the external attacker – either willingly or otherwise, and the result can be even more devastating than that of an external attacker.
Mark Hatton's picture
Unfortunately, when it comes to security, what you’ve accomplished means very little. It’s all about where the vulnerabilities still exist.
Jason Polancich's picture
With your own internal cyber bounty program designed to reward your best assets at their positions, you can begin to see real results against attackers and build a team that will compete over the long haul.