Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

SecurityWeek's daily digest summarizing some of the product and service announcements made on Day 1 (Monday) of the 2020 RSA Conference. [Read More]
Electronics protection company Slickwraps has revealed that user data was compromised recently after a third party accessed an unprotected database left accessible from the Internet. [Read More]
Cisco launches SecureX, a cloud-native security platform designed to improve visibility, deliver analytics, and automate common security workflows. [Read More]
Just weeks into this year’s election cycle, Russia already is actively interfering in the U.S. presidential campaign in hopes of reelecting President Donald Trump, and is also trying to help the candidacy of Sen. Bernie Sanders on the Democratic side. [Read More]
New Mexico’s attorney general sued Google Thursday over allegations the tech company is illegally collecting personal data generated by children in violation of federal and state laws. [Read More]
Google has removed roughly 600 applications from Google Play for violating its ad-related policies. [Read More]
Workplace experience and facility management company ISS World was hit this week by a malware attack that forced its systems offline. [Read More]
FireEye’s M-Trends 2020 report says over 500 new malware families were identified last year and the global median dwell time has continued to drop. [Read More]
The U.S. Defence Information Systems Agency (DISA) has disclosed a 2019 data breach in which personal information may have been compromised. [Read More]
Georgian authorities on Thursday accused Russia’s military intelligence of launching a large-scale cyberattack that targeted the government and private organizations with the goal of destabilizing the ex-Soviet nation. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Marc Solomon's picture
When you’re at RSAC next week remember the “Human Element” is a great lens through which you can view and help assess the value of companies you partner with for security.
Laurence Pitt's picture
What can we do in order to prevent the spread of fake content or reduce the risk of a targeted use of Deepfakes that could cause damage to our organization?
Joshua Goldfarb's picture
Gap analysis can serve as a wonderful driver for improving security metrics if the security team understands how to seize the opportunity it presents.
Gunter Ollmann's picture
While defense scoring lowers the barrier to sharing defensive success insights, it does not yet address the insights gained from learning from others’ failures and the stigma of a breach.
AJ Nash's picture
Elevating from the Cyber threat intelligence (CTI) team concept to an “intelligence team” concept is the next generation of intelligence practice within the private sector.
Marc Solomon's picture
Threat intelligence value comes down to relevance and accessibility, which requires curation into a customized enrichment source, aggregating data filtered by a range of factors.
Craig Harber's picture
No matter how many best-of-breed protective solutions you use to defend your network, the unfortunate reality is eventually an attacker is going to get past them.
AJ Nash's picture
Once we shed the shackles of “cyber” and “threat,” we free our teams to consider a full spectrum of intelligence, including support to physical security, insider threats, procurement, mergers and acquisitions, and executive decision-making.
Marc Solomon's picture
As a security professional you have several corrective measures available so you can efficiently and effectively make sense of massive volumes of data, understand what to work on next and know the right actions to take.
Fred Kneip's picture
While some forward-thinking companies have created c-suite positions for IT and security personnel such as CTOs and CISOs, these are, overall, still relatively rare.