Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Industry professionals comment on recent Google+ security incident involving a bug that exposed personal information from 500,000 accounts [Read More]
Cybersecurity agencies in the US, UK, Canada, Australia and New Zealand release joint report on publicly available hacking tools [Read More]
Security Orchestration, Automation and Response (SOAR) firm Demisto has raised $43 million in a Series C funding round led by Greylock partners. [Read More]
Mozilla commissioned a security audit of the Firefox update system. No critical vulnerabilities were found and the high severity flaws were not easy to exploit [Read More]
Mozilla this week announced that the distrust of older Symantec certificates, initially planned for Firefox 63, will be delayed. [Read More]
Cybersecurity solutions firm Imperva today announced that it has agreed to be acquired by private equity firm Thoma Bravo for roughly $2.1 billion in cash. [Read More]
Siemens informed customers that many of its products are affected by the recently disclosed Foreshadow/L1TF vulnerabilities in Intel processors [Read More]
Google was supposed to be focusing on its launch of a new smartphone and other devices, but the event was being overshadowed by a firestorm over a privacy glitch that forced it to shut down its struggling social network. [Read More]
Security awareness training firm KnowBe4 has added a Virtual Risk Officer (VRO), a Virtual Risk Score (VRS), and Advanced Reporting (AR) features to its security awareness training and simulated phishing platform. [Read More]
The ICS Cyber Security Conference, the largest and longest-running ICS-focused security conference, returns to Atlanta, Ga., on October 22 - 25, 2018 [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Alastair Paterson's picture
Although the challenge may seem insurmountable, there’s a lot that security professionals can do to mitigate insider risk.
Nick Sanna's picture
Cyber risk has risen to the level of enterprise risk – which they expect to be measured, managed, and reported in the terms that the rest of the enterprise understands.
Marie Hattar's picture
Cybersecurity teams need to adopt an adversarial mindset and understand what their enemies are capable of and prepare an appropriate response.
Marc Solomon's picture
ThreatQuotient's Marc Solomon talks with Glen Jones, senior director of Identity and Risk Products at Visa, to discuss on cyber threat and payment card data protection.
Ashley Arbuckle's picture
Through security orchestration and automation, you can gather threat intelligence from the cloud, translate it into a useable format and create new blacklists.
Torsten George's picture
Solving the security challenges healthcare providers face will fuel faster growth, enable further digital transformation, and ultimately result in enhanced patient care and data protection.
Preston Hogue's picture
Security teams should think about how company data might connect with data from other organizations or industries and how those combined data sets could be triangulated into a larger picture that ultimately puts you at risk.
Stan Engelbrecht's picture
Stan Engelbrecht takes a look at how automation and orchestration can replace chaos with order, and how security folks in management positions can benefit from this needed change.
Lance Cottrell's picture
Actively investigating and infiltrating criminal groups online is not “hacking back,” but it may provoke that as a response.
Joshua Goldfarb's picture
While it is never an easy decision to make, there are a number of data points that can help security professionals evaluate whether or not trusting someone is an acceptable risk to take.