Security Experts:

Management & Strategy
long dotted


CISA has been named a Top-Level Root CVE Numbering Authority and it will oversee CNAs that issue CVE identifiers for vulnerabilities in industrial and medical products. [Read More]
The U.S. House of Representatives this week passed the IoT Cybersecurity Improvement Act. [Read More]
OT and IoT cybersecurity company Nozomi Networks announced this week that it’s now a CVE Numbering Authority (CNA). [Read More]
The NSA has published guidance on how the UEFI Secure Boot feature can be customized to fit an organization’s needs. [Read More]
Devo Technology, a company that provides data analytics and security solutions, has raised another $60 million and it has named a new CEO. [Read More]
The U.K.’s National Cyber Security Center (NCSC) has released a guide to help organizations get started with implementing a vulnerability disclosure process. [Read More]
Representatives of the infosec community have signed an open letter in response to an amicus brief that mobile elections platform developer Voatz filed with the U.S. Supreme Court in the case of Nathan Van Buren. [Read More]
Threat actors affiliated with the Chinese Ministry of State Security (MSS) continue to target U.S. government agencies, CISA warns. [Read More]
Six European Union countries and the bloc’s executive Commission have begun testing a virtual “gateway” to ensure national coronavirus tracing apps can work across borders. [Read More]
American tech giant Microsoft said Sunday its offer to buy TikTok was rejected, leaving Oracle as the sole remaining bidder ahead of the imminent deadline for the Chinese-owned video app to sell or shut down its US operations. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Marc Solomon's picture
While it may be a trendy term, in cybersecurity, intelligence pivoting is pivotal to detection and response.
Joshua Goldfarb's picture
A healthy dose of self-doubt can go a long way towards keeping us on our toes and continually improving the security posture of our respective organizations.
Galina Antova's picture
As digital transformation and cybersecurity become pillars that successful companies will build their futures on, the time has come to include CISOs and CIOs on company boards.
Idan Aharoni's picture
The term "Threat Intelligence" encompasses an ever-growing set of offerings that, on an operational standpoint, have different use cases.
Rafal Los's picture
If you're not allocating time to develop strong operational process - integrations and workflows - you're never going to solve the problem you're trying to solve.
Marc Solomon's picture
Security tools need to integrate with a centralized repository of relevant, prioritized threat intelligence, and with all your security controls.
Matt Morris's picture
Companies must instill a culture of resilience in which security improvements are emphasized as a fundamental component of an organization’s individual corporate culture
Joshua Goldfarb's picture
In security, having a plan is important. That being said, there are times when a given plan may no longer be appropriate or effective.
Rafal Los's picture
More security tools can increase your cost, increase overall complexity, and eventually decrease your organization's ability to be effective.
Marc Solomon's picture
Most organizations have a complex security infrastructure that consists of multiple products from multiple vendors to create layers of defense.