Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Healthcare organizations are still struggling with information sharing both internally and externally, participants in an industry-wide cyber-security exercise said.
Verizon expanded its 2014 Data Breach Investigations Report to include security incidents that didn't result in breaches and provided industry-by-industry analysis of various threat types.
Ben-Gurion University of the Negev has signed a $8.5 million agreement with the Israel National Cyber Bureau to develop CyberSpark, which includes a National Cyber Research Center adjacent to BGU’s campus.
Barack Obama will not visit China on his Asia tour next week, but its broadening shadow will be cast everywhere he goes at a time of complex regional disputes and questions about US strategy.
Kaspersky Lab announced major leadership changes to its North American operations this week, while at the same time revealing its strategic plans for expansion in the enterprise IT security market.
A new study from the Ponemon Institute finds a tie between poor security and poor communication.
Germany's aeronautics and space research center has for months been the target of a suspected cyber attack by a foreign intelligence service, according to reports.
According to Mandiant’s M-Trends report, organizations are discovering breaches in their networks faster, but still not nearly soon as they must in order to contain damage and prevent loss of sensitive data.
The Heartbleed vulnerability is "catastrophic” for SSL and Internet security, Bruce Schneier, told SecurityWeek. “On the scale of 1 to 10, this is an 11,” he said. Here is what organizations need to know and what actions they should take.
Defense.Net is a startup providing DDoS mitigation as a service. SecurityWeek sat down with CTO and Founder Barrett Lyon to discuss the security startup.

FEATURES, INSIGHTS // Management & Strategy

rss icon

Marc Solomon's picture
When evaluating managed security services the following five questions can help ensure you get the support you need to stay focused on the threat.
Mark Hatton's picture
Security really is a marathon and there are no days off. Sacrifices are needed and tough decisions are required. The motto of our country’s most elite fighting force, the US Navy SEALs, is The Only Easy Day Was Yesterday.
Chris Coleman's picture
The shaping of the threat intelligence management market is critical to its success, and there is much confusion about the very term “threat intelligence.” I am a firm believer that intelligence is a process, not an individual thing, and that Intelligence is not “done.” It is “created.”
Dr. Mike Lloyd's picture
The fact that insurance companies – well respected by every business-centric executive – look at cyber risk and say “no, thanks” is a pretty clear indicator that something is rotten...
Torsten George's picture
A threat is the agent that takes advantage of a vulnerability. This relationship must be a key factor in the risk assessment process and can no longer be treated as risk’s neglected step child.
Mark Hatton's picture
I am painfully aware that in business and in security, hope is not a plan. However, that doesn’t mean we can’t dream a bit about the best case scenario. In the spirit of the season, here are five things I’m hoping for in the security industry this year.
Wade Williamson's picture
As enterprises become increasingly focused on security, it’s important to take an honest look not just at what security measures are in place, but how they are really used.
Marcus Ranum's picture
When you start your metrics program, you'll find that a great deal of information can be gleaned from existing data that gets stored in various places – most likely in your system logs.
Chris Hinkley's picture
The most advanced technology in the world is only as good as the people and systems behind it. Otherwise your sophisticated security device is nothing more than a paperweight.
Wade Williamson's picture
If criminals can’t use or sell stolen data without being caught, then the data quickly becomes worthless. As a result it’s critical to understand what happens to data after a breach.