Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Over the course of the last week, it has become apparent that the City of Atlanta, Georgia, has paid out nearly $3 million dollars in contracts to help its recovery from a ransomware attack on March 22, 2018. [Read More]
Twitter no longer allows Kaspersky Lab to place advertisements on its platform, apparently over the security firm’s alleged ties to Russian intelligence [Read More]
Microsoft unveils Windows Defender System Guard runtime attestation, a new Windows platform security technology for all editions of Windows [Read More]
FDA reveals its plans for medical device cybersecurity, including requiring update and patch capabilities built into devices, updated guidance for protecting against risks, and policies and procedures for vulnerability disclosures [Read More]
AlienVault launches OTX Endpoint Threat Hunter, a free scanning service that allows organizations to identify threats and assess risk [Read More]
LinkedIn patches AutoFill vulnerability that could have been exploited to harvest data from users’ profiles [Read More]
FireEye announces new solutions, capabilities, pricing and packaging models, and a partnership with Oracle [Read More]
Many security professionals in the energy sector are concerned that a cyberattack on industrial control systems could have “catastrophic” consequences [Read More]
CrowdStrike unveils new Falcon Endpoint Protection Complete solution and a threat analysis subscription module for the Falcon platform [Read More]
IBM releases Adversarial Robustness Toolbox, an open source software library designed to help researchers and developers secure artificial intelligence (AI) systems [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Rafal Los's picture
If you're not careful, security becomes a hinderance and a target. Where security leaders create inflexible environments, security tends to struggle.
Steven Grossman's picture
Without an understanding of where you stand today, new security tools will result in more redundancy and gaps in protection.
Marc Solomon's picture
The industry needs to share a common understanding of how to put threat intelligence into practice to address some of our thorniest security operations challenges.
Ashley Arbuckle's picture
Edna Conway, Cisco’s Chief Security Officer, Global Value Chain, discusses mitigating third-party security risk across an ecosystem that includes tens of thousands of partners located around the globe.
Jim Ivers's picture
More vulnerabilities create more attacks; more attacks breed additional fatigue. So how can we wake up and fix the problems creating such a widespread headache?
Lance Cottrell's picture
Discussions around hacking back in Congress today rely on analogies that are too simple and use examples focused on physical self-defense that fail to capture the true nature of online interactions.
Josh Lefkowitz's picture
Decision advantage reinforces that the value of intelligence lies not in the intelligence itself but in the decisions it shapes and drives.
Joshua Goldfarb's picture
Those of us that spend our lives in security sometimes forget how our field looks and sounds to others.
Marc Solomon's picture
It isn’t sufficient for security teams to prevent, detect and respond to attacks. Security teams also must be able to proactively investigate and understand what the latest, large-scale cyber campaign means to their organization.
Justin Fier's picture
When we look at this cycle of stealthy and silent data breaches, we have to ask ourselves: how can such tremendous amounts of data leave our corporate networks without raising any alarms?