Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

More than $11 million were paid out last year through bug bounty programs hosted by HackerOne, including for 116 flaws that earned hackers over $10,000 [Read More]
Timehop has shared more details on the recent data breach, including what the hacker did on its systems and what other type of information was compromised [Read More]
Semi-conductor giant Broadcom, which recently failed in a bid to buy US rival Qualcomm, announced a cash deal to buy software and services firm CA Technologies for $18.9 billion. [Read More]
Department of Defense (DoD) IT managers say the DoD needs to improve the use of cloud to maintain the military’s technical advantage and support mission success. [Read More]
Facebook could face a hefty compensation bill in Australia after a leading litigation funder lodged a complaint with the country's privacy regulator over users' personal data shared with a British political consultancy [Read More]
Researchers who discovered two new variations of the Spectre attack receive $100,000 bounty from Intel [Read More]
A cyber-espionage group is abusing code-signing certificates stolen from Taiwan-based companies for the distribution of their backdoor, ESET reports. [Read More]
German web hosting firm DomainFactory shuts down forum following data breach. Hacker gained access to sensitive data, including banking information [Read More]
Hackers gained access to Timehop systems in December 2017, but the breach was only discovered on July 4. The incident affects 21 million users [Read More]
Former employee of Israel-based cyber arms dealer NSO Group accused of stealing spyware source code and attempting to sell it for $50 million [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Ashley Arbuckle's picture
Managed security services are now evolving to managed detection and response (MDR) services that include security monitoring, advanced threat detection, and incident readiness and response.
Josh Lefkowitz's picture
With so many intelligence teams blinded by vast amounts of data and an overwhelmingly complex threat landscape, establishing the right intelligence requirements (IRs) can be challenging.
Justin Fier's picture
With many companies’ security tools numbering into the dozens, it is hardly surprising that all too often security teams suffer from alert fatigue and burnout – while genuine threats slip through the cracks.
Marc Solomon's picture
In a virtual cybersecurity situation room, team members can collaborate on investigations to detect threats faster, accelerate response and even anticipate what the future may hold.
Joshua Goldfarb's picture
There are quite a few ways in which enterprises can look to properly evaluate various Vendor Risk Management (VRM) offerings and differentiate between them.
Joshua Goldfarb's picture
We can all be more understanding of people when they do exactly what we incentivize them to do. To that point, I offer “10 security behaviors that anger us, but that we incentivize".
Marc Solomon's picture
It is important for threat intelligence analysts, SOCs and incident responders to work together to take the right actions faster, reducing the time to response and remediation.
Ashley Arbuckle's picture
We have an opportunity to expand the pool of workers and improve security and financial performance in the process, with teams that are based on inclusion and diversity.
Bradon Rogers's picture
While a contract, distributed, partner-oriented workforce and supply chain can create serious risks to your organization, careful implementation of visibility and data protection strategies can help you mitigate many of the risks.
Josh Lefkowitz's picture
Before finalizing a vendor relationship, it’s crucial to construct a response plan in preparation for any future incidents the vendor might experience.