Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Russian and Chinese spies repeatedly targeted the Czech state last year, the country's intelligence service (BIS) said in its 2018 report published Tuesday, detailing cyber-attacks and disinformation. [Read More]
Palo Alto Networks enters agreement to acquire cloud security company Aporeto for roughly $150 million in cash. [Read More]
Catch Hospitality Group alerted its restaurant customers that cybercriminals managed to infect some of its point-of-sale (“PoS”) devices with credit card data scraping malware. [Read More]
A U.S. Department of Defense unit has opened its first remote office outside the Pentagon with its new facility in east Georgia. [Read More]
At least 160 Church’s Chicken restaurants across 11 U.S. states are impacted by a data breach that involved unauthorized access to payment processing systems. [Read More]
One in ten of Louisiana’s 5,000 computer network servers that power operations across state government were damaged by this week’s cyberattack, a key technology official told lawmakers. [Read More]
Chinese smartphone maker OnePlus informs customers that their order information was exposed in a data breach. [Read More]
U.S. communications regulators have cut off government funding for Chinese companies Huawei and ZTE, citing security threats. [Read More]
The DHS’s Cybersecurity and Infrastructure Security Agency (CISA) this week announced the release of an open source post-election auditing tool in preparation for the 2020 elections. [Read More]
Google is expanding its Android bug bounty program and it has announced a top reward of $1.5 million for Pixel Titan M exploits. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Joshua Goldfarb's picture
Change may not always be on the docket, but when it is, how can we embrace it, understand it, and work to create a constructive environment around it?
Josh Lefkowitz's picture
The successful execution of each step of the intelligence cycle relies on the successful execution of the step that came before it.
Fred Kneip's picture
Third party cyber risk management programs need to go beyond an initial scan and evaluate your third party’s security from the inside out.
Joshua Goldfarb's picture
When the security of our organization depends on us leaving our comfort zone, how can we ensure that we accomplish what we set out to do without putting the organization at additional risk?
Marc Solomon's picture
As the holiday approaches, I thought I’d take the opportunity to share three things I believe every security professional can give thanks for.
Josh Lefkowitz's picture
It’s crucial to recognize that annual security predictions generally only include that which can be feasibly predicted by the final months of the prior year.
Marie Hattar's picture
The solution: every week, devote at least two hours to basic cyber hygiene. Four best practices will help your team build habit from repetition.
Joshua Goldfarb's picture
Security metrics is a topic that, while challenging, is also important and at the top of the priority list for security organizations. Here are five tips for leveraging security metrics to keep your organization out of the lion’s den.
Craig Harber's picture
As long as organizations continue to employ simplistic “set it and forget it” security approaches, they will be forced into playing reactive, catch-up defense against cyber attackers.
Fred Kneip's picture
Employing a third party adds risk, especially if that company is given some level of access to network and computing resources, or is asked to handle and protect critical or proprietary information.