Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Some Florida residents who have made unemployment claims may have had personal data stolen. [Read More]
On May 22, Zoom will share a draft of the cryptographic design it wants to use for its future end-to-end encryption feature. [Read More]
Cyber insurance and security provider Coalition this week announced that it has raised $90 million in equity capital. [Read More]
Client-side web security provider Source Defense this week announced raising $10.5 million in a Series A+ funding round. [Read More]
Japan is investigating a possible leak of data including details of a prototype missile in a massive cyberattack earlier this year on Mitsubishi Electric. [Read More]
Facebook has agreed to pay a Can$9 million (US$6.5 million) fine for making false or misleading claims about its privacy settings, Canada's competition watchdog announced Tuesday. [Read More]
Container security company Aqua Security has raised another $30 million, which brings the total raised by the firm to date to more than $130 million. [Read More]
Verizon's Data Breach Investigations Report (DBIR) remains a fundamental asset for the discovery of existing and evolving threats, allowing practitioners to see where they should focus effort for an effective risk-based security posture. [Read More]
Germany's foreign intelligence service violated the constitution by spying on internet data from foreigners abroad, the nation's top court ruled Tuesday in a victory for overseas journalists who brought the case. [Read More]
The price of some iOS exploits has dropped recently and experts believe this is a result of researchers’ increased focus on iOS hacking. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

John Maddison's picture
By combining ML and AI with a team of advanced cybersecurity professionals to deploy true AI-driven security operations, organizations can stay a step ahead of cybercriminals.
Torsten George's picture
Today’s economic climate exacerbates risks of insider threats, as pending furloughs or pay cuts may tempt employees to exfiltrate data to secure a new job, make up for income losses, etc.
Joshua Goldfarb's picture
Most security organizations realize that, regardless of how much progress they’ve made towards improving maturity and efficiency, there is still more work to be done.
Marc Solomon's picture
With an extensible platform and flexible data model, you can take full advantage of the volume and variety of data to gain insights, and the technologies in your ecosystem to accelerate detection and response and mitigate risk.
Jim Ducharme's picture
Heightened anxiety is a normal consequence of drastic change, and it’s natural for the entire organization to be stressed by the shift to a fully remote work environment.
Preston Hogue's picture
The healthcare industry will need advanced security measures to identify and mitigate flaws in new apps carrying the world’s most sensitive, regulated information.
Marc Solomon's picture
As security professionals, the power of human creativity, sharing and collaboration can help overcome challenges and keep businesses moving forward safely.
Joshua Goldfarb's picture
Even in toxic work environments, the security team must work to minimize risk and defend the organization from information security threats.
Marie Hattar's picture
Organizations should regularly put security products, processes and people to the test, and the reward is better, more efficient protection against attacks.
Marc Solomon's picture
The LEAD threat intelligence framework is a perfect example of the symbiosis between technology and people to strengthen security posture.