Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

CISA has issued a warning for recent and newly patched VMware vulnerabilities — the agency believes the new flaws will quickly be exploited by threat actors. [Read More]
Cornami, a company that helps companies secure data from post-quantum threats, raises $68 million in oversubscribed Series C funding. [Read More]
The US government has warned that rogue IT workers from North Korea enable DPRK hacking operations and provide logistical support for its threat actors. [Read More]
SecurityWeek will host its 2022 Threat Intelligence Summit as a fully immersive virtual event on May 18, 2022. [Read More]
Canada, the Netherlands, New Zealand, the US, and the UK warn that threat actors exploit weak cybersecurity practices for initial access. [Read More]
Private equity firm Carlyle is acquiring ManTech, a US defense contractor that provides cybersecurity and other technology solutions, in a $4.2 billion deal. [Read More]
MITRE, CyManII and the US government have teamed up for a special interest group whose goal is to enhance cyber defenses for ICS and OT. [Read More]
Pathlock has announced several mergers and acquisitions, as well as raising $200 million as part of these transactions. [Read More]
SecurityWeek will host its 2022 Threat Intelligence Summit as a fully immersive virtual event on May 18, 2022. [Read More]
Fifteen cybersecurity-related M&A deals have been announced in the first half of May 2022. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Marc Solomon's picture
Here are three challenges CISOs should prepare for as the ripple effects of the SEC amendments make their way through to board recruitment processes.
Joshua Goldfarb's picture
In addition to helping security teams recruit and retain the talent they need, employee wellness brings other benefits. Here are five ways in which wellness is good for security:
Gordon Lawson's picture
The surge of cyber attacks in 2021 was a wake-up call for consumers, who felt the firsthand effects that can result from a breach.
Jeff Orloff's picture
With the labor market for cybersecurity pros being extremely tight, the old ways of recruiting are rife with weaknesses and biases, while the urgency to recruit people is intense.
Laurence Pitt's picture
It’s time to step back and look at the role of the IT industry in developing, deploying, maintaining, growing and eventually, sustainably retiring technology and solutions.
Torsten George's picture
Organizations need to look beyond preventive measures when it comes to dealing with today’s ransomware threats and invest in ransomware response, which improves their ability to prepare and quickly recover endpoints from ransomware attacks.
Marc Solomon's picture
As threat actors continue to evolve their TTPs to take advantage of crises and outbreaks, the intelligence sources and information sharing mechanisms available to help will become even more important.
Joshua Goldfarb's picture
If you know for a fact that a person or group has poor intentions, it may make sense to begin documenting and reporting nefarious activity you observe from them.
Landon Winkelvoss's picture
Many think open source intelligence is just another name for better googling. They are wrong. Good open source and threat intelligence are derived from three core capabilities.
Keith Ibarguen's picture
Vendor agnostic technology, married with actionable, globally-sourced, and continually evolving intelligence, augmented by humans, is needed to defend our enterprises.