Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Domain and web application security firm Detectify has received a $10 million investment from Insight Partners. [Read More]
Thirty-nine cybersecurity-related M&A deals were announced in September 2022. [Read More]
The Shangri-La hotel group has said a database containing the personal information of customers at eight of its Asian properties between May and July has been hacked. [Read More]
In this Q&A from the SecurityWeek CISO Forum, venture capital investors discuss the state of cybersecurity investments, business strategies in a confusing economic climate, predictions on hot and not-so-hot product categories, and what happens with all those cybersecurity unicorns. [Read More]
CISA has published guidance for organizations to prepare for the November 1, 2022, move from Traffic Light Protocol (TLP) version 1.0 to TLP 2.0. [Read More]
Microsoft intercepts a Lazarus sub-group rigging popular open source software utilities to plant dangerous malware implants. [Read More]
The funding frenzy in the software supply chain space now includes Ox Security, an Israeli startup that just raised a whopping $34 million in seed funding. [Read More]
Australia could have tough new data protection laws in place this year in an urgent response to a cyberattack that stole the personal data of 9.8 million Optus wireless customers. [Read More]
Auth0 says it has not identified a data breach following a third-party’s claim to possess Auth0 older code repositories. [Read More]
A survey of ethical hackers conducted by Bishop Fox and SANS found that many could execute an end-to-end attack in less than a day. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Marc Solomon's picture
Cyberattacks and data breaches continue to rise year-over-year and another so-called silver bullet technology isn’t going to stop that trend.
Joshua Goldfarb's picture
Looking long is an important skill for security and fraud teams to develop. Strong leadership, a focus on achieving impactful long-term goals, and the discipline to achieve those goals are all important parts of the game.
Jeff Orloff's picture
Nothing can ever prepare an organization for every ransomware scenario. However, if you train for multiple situations, your team will be able to make decisions more quickly, and react appropriately when an unforeseen incident occurs.
Keith Ibarguen's picture
It is encouraging to see the many strategic activities happening in cyber policy among the world’s most powerful nations.
Marc Solomon's picture
The goal of security automation is to accelerate detection and response, but you’ll waste a lot of time if you try to eat the elephant all at once.
Marc Solomon's picture
With an approach that is data-driven and flexible, you can get as simple or as advanced as the detection and response demands.
Derek Manky's picture
Organizations can strengthen their security posture by getting detailed information on current attack techniques and keeping their employees’ cyber hygiene training up to date.
Laurence Pitt's picture
It was great to be back in-person at security events, and I enjoyed meeting with people and discussing our solutions face-to-face.
Jeff Orloff's picture
The Defense Readiness Index is a reliable alternative for assessing a security team’s skill level, developing a roadmap for improving cyber competencies, and reaching the optimal level of cyber security readiness.
Marc Solomon's picture
As automation continues to evolve, a new approach to accelerate detection and response is emerging based on data and business logic to automatically trigger simple actions that can be standalone or be chained together.