Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

When state election officials gathered ahead of the last presidential election, major topics were voter registration, identity theft and ballot design. This year, the main theme is election security. [Read More]
The U.S. Defense Department wants companies hoping to obtain defense contracts to demonstrate that they can keep sensitive information safe. [Read More]
A major exercise whose goal was to test the cyber and physical security of North America’s grid has enabled the energy industry and governments to review and improve incident response plans and collaboration. [Read More]
Consulting giant Accenture launches three cyber ranges designed to help industrial companies practice their cyberattack response plan. [Read More]
Immersive Labs, a company that provides an interactive and gamified cyber skills platform, has raised $40 million in a series B funding round. [Read More]
FireEye surveyed over 800 cybersecurity executives from around the world and most of them believe cybersecurity solutions are either inexpensive or their cost is reasonable for the value they provide. [Read More]
Given the difficulties in designing, conducting and interpreting vendor surveys, it is necessary to question the value of them, both individually and collectively. [Read More]
Microsoft is working with PC manufacturing and silicon partners to design devices with a more secure firmware layer. [Read More]
The Cyber Security Agency of Singapore (CSA) has published the country’s Operational Technology Cybersecurity Masterplan. [Read More]
Immersive Labs has integrated MITRE ATT&CK into its skills development platform, allowing organizations to map and manage specific people's skills to actual risks. [Read More]

FEATURES, INSIGHTS // Training & Certification

rss icon

Mark Hatton's picture
Software and hardware alone are not enough to manage a massive enterprise security program. You need security professionals and experienced leaders who can keep the team (and the tools) operating effectively.
James McFarlin's picture
Launched in 2009, CyberPatriot began with eight high school cybersecurity teams competing for scholarships. In just six years, participation quickly expanded to more than 1500 teams around the world.
Mark Hatton's picture
Are we doing enough to ensure that we are cultivating the next generation of cyber professionals? Do we invest enough in education programs that so that students go on to institutions of higher learning with a goal of becoming a cybersecurity expert?
Marc Solomon's picture
Open source is a valuable tool for defenders as they work to close these gaps and to gather greater intelligence about potential threats to make better decisions and take action.
Danelle Au's picture
The most effective CISOs today can’t just be experts in security. Organizations need a versatile security leader that speaks a new language-- one that is a blend of technology and business.
Mark Hatton's picture
The following is a list of questions that I recommend everyone ask security vendors as an initial filter.
Chris Hinkley's picture
Without the internal and external safeguards working in conjunction, your vulnerability will spike and your performance will suffer as a by-product -- two things you can’t afford to have happen.
Matthew Stern's picture
Successful conduct of military operations requires a unit’s clear understanding of the battle space it controls and its “area of operations”. This includes not only the terrain of the battlefield but also the capabilities, motives, and determination of the enemy they face.
Jon-Louis Heimerl's picture
In a perfect world, we would not stress this awareness for one month only. Awareness should be a constant, ongoing effort.
Chris Poulin's picture
Security should be a fascinating, dynamic, and creative pursuit. I say have fun, be creative, be criminal in your thoughts, but not your actions. The black hats who have you in their targets are having a blast.