Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Tumblr has patched a vulnerability that could have been exploited to obtain user account information, including email addresses and protected passwords [Read More]
A former Equifax manager who was put in charge of creating the equifaxsecurity2017.com website following the massive breach at the credit reporting agency has been sentenced to 8 months of home confinement for insider trading [Read More]
Many servers may be exposed to attacks due to an authentication bypass vulnerability affecting the libssh SSH library [Read More]
WhiteSource, a company that specializes in open source security management, raises $35 million in Series C funding round [Read More]
Health insurer Anthem Inc. has agreed to pay the government a record $16 million to settle potential privacy violations in the biggest known health care hack in U.S. history, officials said. [Read More]
The DHS ordered federal agencies to fully implement DMARC by October 16, 2018. While there has been significant progress, many agencies failed to meet the deadline [Read More]
All major web browsers will deprecate support for the older Transport Layer Security (TLS) 1.0 and 1.1 protocols in the first half of 2020 [Read More]
IBM Security Connect is a new cloud platform that brings together data, applications and tools from over a dozen vendors [Read More]
Apple, Cisco, Mozilla, Kaspersky and others are concerned about Australia's encryption laws, despite the government specifically claiming it will not weaken encryption [Read More]
Could hackers have been able to see the last person you cyberstalked, or that party photo you were tagged in? According to Facebook, the unfortunate answer is "yes." [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Mike Fleck's picture
Enterprises need proactive and automated checks and balances on cloud access management and information sharing.
Josh Lefkowitz's picture
Evaluating a threat intelligence vendor’s collection strategy effectively is a complex process that requires far more than simply obtaining the answers to the questions outlined above.
Stan Engelbrecht's picture
These seven processes should be automated in order to save valuable time during incident response and security investigation procedures, and help organizations improve their overall cybersecurity posture.
Alastair Paterson's picture
Encouraging and supporting diversity and inclusion in the workforce will allow us to overcome the cybersecurity workforce gap now estimated to reach 1.8 million by 2022.
Preston Hogue's picture
Technical hacks to gain entry into sensitive systems are still an important part of the equation, but today they are just one tool in a much larger toolkit.
Ashley Arbuckle's picture
Customer Experience (CX) is becoming a key driver of success in the security industry, not just for companies that deliver superior customer experiences but – more importantly – for the organizations and security professionals they serve.
Marc Solomon's picture
Collaboration holds the key to improved time to detection and response, so teams can better address the concerns that permeate the organization when a large-scale attack happens.
Joshua Goldfarb's picture
What does letting go of the familiar have to do with security and what can we learn from it? I’d argue quite a bit.
Justin Fier's picture
Over time, holding people responsible will lead individuals to see how their actions impact the security of the organization and come to consider themselves responsible for the security of the company.
Josh Lefkowitz's picture
It is important to understand how the right intelligence can support network defense teams, fraud, physical security, M&A, insider threat, supply chain, and brand reputation teams, among others.