Security Experts:

Management & Strategy
long dotted


Industrial cybersecurity company Claroty has raised $140 million in a Series D funding round, which brings the total raised by the firm to $235 million. [Read More]
General Manager of the Microsoft Threat Intelligence Center (MSTIC) John Lambert recently keynoted the SecurityWeek threat-intelligence summit where he called for a more collaborative approach to information sharing in cybersecurity. [Read More]
Identity management provider Elisity closes Series A funding to help scale and meet demand for its cloud-delivered cybersecurity platform. [Read More]
The attack took place on June 1 and forced the company to shut down all of the affected servers and computers. [Read More]
Security researchers at Group-IB believe that Chinese nation-state threat actor APT41 performed the cyberattack against aviation IT firm SITA [Read More]
CISA has released a fact sheet focusing on the threat posed by ransomware attacks to OT/ICS assets. [Read More]
The Group of Seven (G7) has asked Russia to take action against those who conduct ransomware attacks and other cybercrimes. [Read More]
Immersive plans to use the new funds to accelerate the delivery of a progressive new Cyber Workforce Optimization platform. [Read More]
Google is offering U.K. regulators a role overseeing its phasing out of ad-tracking technology from its Chrome browser, in a package of commitments the tech giant is proposing to apply globally to head off a competition investigation. [Read More]
Several cybersecurity-related acquisitions and mergers were announced June 7-13, 2021. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Landon Winkelvoss's picture
Ineffective security approaches when integrating two separate organizations can lead to significant issues that could undercut the business value of a merger or acquisition.
Tim Bandos's picture
Before even thinking about approaching a vendor, talk at length about the project amongst yourselves. What problem are you trying to solve and how will you know when you’ve solved it?
Marc Solomon's picture
As you determine what security technologies to invest in, develop not only a technology roadmap, but also include and align an operational roadmap.
Laurence Pitt's picture
For many of us, RSA Conference 2020 in San Francisco was the last time we came together as a community, met with colleagues, and saw new technology offerings.
Rob Fry's picture
By taking some lessons from outside our cybersecurity sandbox, we can address some of the significant challenges in cybersecurity.
Landon Winkelvoss's picture
While cyber due diligence has yet to become commonplace in M&A transactions, the consequences of failing to identify risks and active campaigns can have costly implications.
Gunter Ollmann's picture
In the merry-go-round world of InfoSec technologies and “what’s old is new again,” this year we should include Attack Surface Management with a dash of Continuous.
Torsten George's picture
President Biden's Executive Order (EO) to improve the nation’s cybersecurity is a good first step but it is likely not going to materially change the defensive posture of the nation.
Joshua Goldfarb's picture
Josh Goldfarb analyzes five statements stubborn people often say, discusses how they harm an organization's security posture, and suggests ways forward in each case.
Marc Solomon's picture
For efficiency and effectiveness, automation must take a data-driven approach and encompass how we initiate and learn from the response, not just how we execute the process.