Security Experts:

Management & Strategy
long dotted


A recent senate hearing examined the progress in implementing the White House cybersecurity executive order as well as understanding the challenges facing public-private information sharing programs.
After being named as a defendant in a lawsuit related to the massive data breach that hit Target late last year, Trustwave’s top executive says the claims against the firm are without merit
ThreatMetrix, a provider of technologies to help organizations detect and block cybercrime, today announced that it has closed a $20 million Series E round of financing.
China's President Xi Jinping questioned his US counterpart Barack Obama about reports that Washington had secretly tapped Chinese telecoms giant Huawei for years, a top security aide said Monday.
The Cyber Security Research Alliance announced the selection of its first academic research partners who will work together to advance cyber physical system security in transportation vehicles, medical devices and the power grid.
Former FBI Director Robert S. Mueller has joined law firm WilmerHale as partner and will work within its investigations and strategic counseling practices.
The sixth annual Insomni'hack ethical hacking competition, organized by IT security firm SCRT, drew over 300 hackers who battled for hours to solve a range of fiendish computer security challenges.
Symantec on Thursday announced that CEO Steve Bennett was terminated by the security company and has been replaced by board member Michael Brown as interim president and chief executive officer, effective immediately.
Palo Alto Networks has opened a new cybersecurity solutions lab at the company’s new regional headquarters in Singapore.
Jim Lewandowski has been named chief executive officer (CEO) of cloud hosting provider FireHost.

FEATURES, INSIGHTS // Management & Strategy

rss icon

Dr. Mike Lloyd's picture
The fact that insurance companies – well respected by every business-centric executive – look at cyber risk and say “no, thanks” is a pretty clear indicator that something is rotten...
Torsten George's picture
A threat is the agent that takes advantage of a vulnerability. This relationship must be a key factor in the risk assessment process and can no longer be treated as risk’s neglected step child.
Mark Hatton's picture
I am painfully aware that in business and in security, hope is not a plan. However, that doesn’t mean we can’t dream a bit about the best case scenario. In the spirit of the season, here are five things I’m hoping for in the security industry this year.
Wade Williamson's picture
As enterprises become increasingly focused on security, it’s important to take an honest look not just at what security measures are in place, but how they are really used.
Marcus Ranum's picture
When you start your metrics program, you'll find that a great deal of information can be gleaned from existing data that gets stored in various places – most likely in your system logs.
Chris Hinkley's picture
The most advanced technology in the world is only as good as the people and systems behind it. Otherwise your sophisticated security device is nothing more than a paperweight.
Wade Williamson's picture
If criminals can’t use or sell stolen data without being caught, then the data quickly becomes worthless. As a result it’s critical to understand what happens to data after a breach.
Marcus Ranum's picture
There are many important and useful tools related to the metrics landscape; let's take a look at some of them and how they fit together.
Mark Hatton's picture
During the RSA Conference we heard a lot about the changing landscape of threats and how attackers are becoming more sophisticated and better funded every day. So naturally the debate ensued around whether keeping pace and ultimately closing the gap is a question of technology, spend or approach.
Aviv Raff's picture
The worst time for an enterprise to discover a gap between what they expected and what they need is during a cyber attack. Here are five questions that enterprises should ask about actionable intelligence now, not later.