Security Experts:

Management & Strategy
long dotted


Citing evidence of active exploitation against five specific vulnerabilities, the U.S. cybersecurity agency warned that further delays in applying fixes “pose significant risk to the federal enterprise. [Read More]
Please join us today at 1PM ET for a fireside chat with Steve Katz, the first ever Chief Information Security Officer. In this online session, Steve and Abnormal CISO Mike Britton will discuss: [Read More]
Another $10 million has been raised by Karamba Security, a firm that provides products and services for securing industrial, automotive, enterprise and consumer IoT systems. [Read More]
Within four months, the company has closed three funding rounds, raising over $140 million. [Read More]
Cybersecurity unicorn Aqua Security has acquired software development security company Argon for tens of millions of dollars. [Read More]
The number of cybersecurity-related mergers and acquisitions announced in the past months has remained constant, with 40 deals announced in November 2021. [Read More]
Honeywell Quantum Solutions has merged with Cambridge Quantum to create Quantinuum, a quantum computing giant that will soon launch a cybersecurity product. [Read More]
SecurityWeek speaks with Steve Katz, widely known as the world’s first Chief Information Security Officer (CISO), about his journey in the security world. [Read More]
Security experts warn that the 'Sabbath' ransomware group is targeting organizations in education, health and natural resources in both the United States and Canada. [Read More]
Software supply chain security company Cycode has raised $56 million in a Series B funding round. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Torsten George's picture
While it might be overwhelming to look at the critical threats on the horizon you need to prepare for, focusing on these predictions for 2022 will help you strengthen your security posture and minimize your organization’s risk exposure.
Marie Hattar's picture
In order to deliver on the promise of 5G, we need new industry standards for security, testing, and training to proactively combat 5G cyber threats and minimize risks.
Gordon Lawson's picture
For red teams, using an obfuscated network for testing offers the advantage of hiding who is performing the attack and where it is originating, for a more real-life context
Tim Bandos's picture
There’s no doubt that there are a lot of things on your CISO’s mind. Whether they have an active role at board meetings or not, chances are these are some of the most pressing items they’d like to discuss with you.
Jeff Orloff's picture
Most organizations rely too heavily on their cybersecurity pros to protect them from threats, ignoring the painful reality that human error is by far the most common cause of security breaches.
John Maddison's picture
Recent changes have resulted in a proliferation of devices and users working from anywhere, which has expanded the digital attack surface and exposed more applications, devices, data, and users to risk.
Keith Ibarguen's picture
One of the best approaches to identifying both the value you are bringing to a customer and opportunities to increase that value is by going on the change-journey with your customers.
Torsten George's picture
Before the next Cybersecurity Awareness Month comes along, companies across all industries should consider moving to a Zero Trust approach, powered by additional security measures such as MFA and endpoint resilience.
Landon Winkelvoss's picture
Conducting scaled and cost-effective attack surface and digital threat monitoring gives organizations of all sizes the best chance of identifying and defeating their adversaries.
Joshua Goldfarb's picture
By understanding what makes a great security practitioner, organizations can learn how to recruit and retain effective security practitioners.