Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Researchers were able to access private personal information of more than 30,000 medical marijuana patients, recreational pot customers or dispensary employees in several states. [Read More]
Britain is expected to announce next week whether to allow China's Huawei to develop its 5G network, an official said on Friday, setting out reasons for agreeing despite US opposition. [Read More]
Citrix has released a new set of patches for the recently disclosed CVE-2019-19781 vulnerability and partnered with FireEye for a tool that tells users if their systems have been compromised via the security flaw. [Read More]
Pwn2Own Miami: Researchers earn $280,000 for hacking industrial control systems (ICS) and associated protocols. [Read More]
Paying off hackers after a ransomware infection could end up being a total loss, according to a study released Thursday which finds some attackers just take the money and run. [Read More]
Data security startup Privafy has emerged from stealth mode with $22 million in funding, which it will use to scale product development. [Read More]
Mastercard's new cyber center in Vancouver is sited at the refurbished Old Stock Exchange Building, where Mastercard subsidiary NuData is also located. [Read More]
The United States pressed France on Wednesday to take "strong security measures" against potential breaches from 5G services provided by Chinese telecommunications firm Huawei, saying failure to do so could imperil intelligence exchanges. [Read More]
Jan. 22, 2020 is the deadline to seek cash payments and claim free services as part of Equifax's $700 million settlement over a massive data breach. [Read More]
Cyber insurance provider Coalition has acquired BinaryEdge and it will integrate BinaryEdge technology into its cyber insurance and security platform. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Craig Harber's picture
No matter how many best-of-breed protective solutions you use to defend your network, the unfortunate reality is eventually an attacker is going to get past them.
AJ Nash's picture
Once we shed the shackles of “cyber” and “threat,” we free our teams to consider a full spectrum of intelligence, including support to physical security, insider threats, procurement, mergers and acquisitions, and executive decision-making.
Marc Solomon's picture
As a security professional you have several corrective measures available so you can efficiently and effectively make sense of massive volumes of data, understand what to work on next and know the right actions to take.
Fred Kneip's picture
While some forward-thinking companies have created c-suite positions for IT and security personnel such as CTOs and CISOs, these are, overall, still relatively rare.
Marc Solomon's picture
Security teams need the ability to understand threats, hunt for threats and use automation effectively and responsibly.
Joshua Goldfarb's picture
Josh Goldfarb presents the top ten New Year’s security resolutions that we should make and keep in 2020.
Josh Lefkowitz's picture
Choosing which vendor to partner with can be exceptionally difficult for MSSPs due to the oversaturation and complexity of the threat intelligence market.
Joshua Goldfarb's picture
Change may not always be on the docket, but when it is, how can we embrace it, understand it, and work to create a constructive environment around it?
Josh Lefkowitz's picture
The successful execution of each step of the intelligence cycle relies on the successful execution of the step that came before it.
Fred Kneip's picture
Third party cyber risk management programs need to go beyond an initial scan and evaluate your third party’s security from the inside out.