Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

The United States, Canada, Australia and New Zealand have joined the U.K. in blaming Russia for the destructive NotPetya attack launched last summer [Read More]
Dispel launches platform designed to help secure elections, including voter, ballot and campaign information [Read More]
Security experts earned more than $100,000 for over 100 vulnerabilities reported as part of the Hack the Air Force 2.0 bug bounty challenge [Read More]
Intel opens bug bounty program to all researchers and offers up to $250,000 for side-channel vulnerabilities like Spectre and Meltdown [Read More]
UK officially accuses the Russian government of being behind the NotPetya attack, which cost major organizations millions [Read More]
Kaspersky files new lawsuit over the U.S. government’s software ban, this time challenging the National Defense Authorization Act (NDAA) [Read More]
Thirty-five percent of CISOs in the financial sector consider staff training to be the top priority for cyber defense. Twenty-five percent prioritize infrastructure upgrades and network defense. [Read More]
Pepperl+Fuchs HMIs are vulnerable to Meltdown and Spectre attacks, but exploitation should not be easy if organizations follow security best practices [Read More]
Schneider Electric patches vulnerabilities in IGSS automation system, including in SCADA software and mobile applications [Read More]
Bitmessage developers rush to patch remote code execution vulnerability in PyBitmessage in response to a zero-day attack [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Marc Solomon's picture
With the right technologies and/or services, every organization can get relevant, prioritized threat intelligence how, when and where they need it.
Joshua Goldfarb's picture
I’d like to share some of the observations I’ve made throughout the years around behaviors that aggravate the “culture clash” between salespeople and security practitioners.
Stan Engelbrecht's picture
Responding to an incident can require extreme time-sensitivity and when tensions are running high, it’s easy to miss something important along the way.
Steven Grossman's picture
Symantec Senior VP of Information Protection, Nico Popp speaks to Steven Grossman on the challenges enterprises are facing to support collaboration, cloud adoption, remote connectivity, and mobile computing.
Preston Hogue's picture
The new world of security is a more streamlined model that involves transferring many types of risk—and many of the associated controls—to third parties in a variety of ways.
Justin Fier's picture
The insider threat is under-scrutinized by the security community, leaving networks vulnerable to compromise by their own employees, especially those with privileged access.
Josh Lefkowitz's picture
Real-time intelligence is exceedingly difficult to attain. Many current offerings are limited in how they can address the broad spectrum of threats and adversaries that exist today.
Joshua Goldfarb's picture
When a high profile event like Meltdown/Spectre comes around, organizations need actionable information that they can use to mitigate their risk and get back to worrying about their core business.
Oliver Rochford's picture
Fear Uncertainty and Doubt or FUD, have always played a part in convincing businesses and governments to invest in cybersecurity.
Stan Engelbrecht's picture
The rapidly evolving threat landscape, constantly changing best practices, and surplus of security tools make it easy to overlook important steps during incident response (IR) planning.