Security Experts:

Management & Strategy
long dotted


The Clop ransomware gang has leaked Qualys files it gained access to during a December 2020 cyber-attack on Accellion FTA. [Read More]
Uber has turned the CISO reins to NewsCorp executive Latha Maripuri, while Square taps a Google veteran to be manage its security program. [Read More]
Intel patched 231 vulnerabilities in its products in 2020, roughly the same as in the previous year, with an average yearly payout of $800,000. [Read More]
A researcher revealed that some exploits for the Spectre vulnerability were recently uploaded to VirusTotal. But just how serious of a threat do these exploits pose? [Read More]
The company seeks to improve security of servers and connected devices with Secured-core Server and Edge Secured-core. [Read More]
Microsoft has raised the alarm after discovering Chinese cyber-espionage operators chaining multiple zero-day exploits to siphon e-mail data from corporate Microsoft Exchange servers. [Read More]
The cyber-incident forced the company to shut down the IT networks at multiple hospitals in the United States. [Read More]
Threat intelligence vendor Recorded Future is reporting a wave of targeted attacks against power plants, electricity distribution centers and seaports in India. [Read More]
Identity-as-a-Service (IDaaS) company Auth0 announced on Monday that Jameeka Green Aaron has joined the company as Chief Information Security Officer (CISO). [Read More]
The NSA explains how a Zero Trust security model can help better secure enterprise networks and sensitive data. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Torsten George's picture
Cyber resilience can be considered a preventive measure to counteract human error, malicious actions, and decayed, insecure software.
Yaniv Vardi's picture
Supply chain cyber risk is complicated and spans the entire lifecycle of a product—across design, manufacturing, distribution, storage, and maintenance.
Marc Solomon's picture
The center of gravity of the Security Operations Center (SOC) used to be the SIEM, but this is shifting as the mission of the SOC shifts to become a detection and response organization.
Marc Solomon's picture
The pandemic has resulted in security team members and teams working better together, as well as more closely with other departments and with industry sharing groups.
Laurence Pitt's picture
In 2021 we will see challenges and changes, but the moves forward will be positive and empower both users and the business to succeed securely.
AJ Nash's picture
For companies trying to build new or mature existing intelligence programs, the Age of COVID has been an excellent time to capture 30-60 minutes with that hard-to-find manager
Marc Solomon's picture
To push security operations forward, we must move towards a single, collaborative environment that can include threat hunters, incident handlers and threat intelligence and SOC analysts.
Torsten George's picture
While the SolarWinds hack is not the first supply chain attack to make headlines, its sophistication and blast radius is forcing organizations to consider how they can minimize their exposure to these types of threats in the future.
AJ Nash's picture
As you build your cyber intelligence program – and have all the vendors lined up to take your money – don’t overlook the importance of investing in the right people.
Laurence Pitt's picture
Many security teams will have to reduce budget against projects scheduled for 2021, with funds being re-allocated to pandemic-related business and workforce enablement