Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

A technical alert issued by the US and UK details how Russian state-sponsored hackers target government and private-sector organizations by abusing various networking protocols [Read More]
Intel announces new silicon-level security, including threat detection technology and a framework that standardizes security features built into processors, and a strategic collaboration with Purdue University [Read More]
U.S. Energy Department announces funding opportunity for research and development of cybersecurity technologies designed to protect energy infrastructure against attacks [Read More]
IBM adds intelligent orchestration capabilities to incident response platform and launches new threat and vulnerability management service [Read More]
The 2016 data breach that Uber made public in November 2017 impacted over 25 million riders and drivers in the United States, the Federal Trade Commission (FTC) reveals. [Read More]
Head of the GCHQ spy agency reveals that the UK has launched a major cyberattack on the Islamic State [Read More]
OPAQ Networks raises $22.5 million to accelerate growth and support go-to-market initiatives. Total raised to date is $43.5 million [Read More]
Palo Alto Networks acquires Israel-based incident response firm Secdo. Financial terms not disclosed, but some reports say Palo Alto will pay $100 million [Read More]
Czech antivirus software maker Avast announced Thursday that it will float on the London stock market next month in the British capital's biggest ever technology IPO [Read More]
Endpoint security firm Carbon Black files for IPO, looking to raise $100 million. The company’s stock will be traded on Nasdaq under CBLK [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Joshua Goldfarb's picture
Directness is something that some cultures do better than others. So how can we as security practitioners identify areas in which directness can help us improve?
Torsten George's picture
The Zero Trust Security model offers a very pragmatic blueprint for implementing identity and access management-based strategies to secure applications, devices, data, and infrastructure – both on-premise and in the cloud.
Alastair Paterson's picture
Security teams need visibility outside the organization and across the widest range of data sources possible to mitigate digital risk and better protect the organization.
John Maddison's picture
Digital transformation and the accelerated evolution of cybercrime are the biggest challenges that IT security teams have ever had to face.
Steven Grossman's picture
Identifying those kinds of repeated non-malicious behaviors amongst a group of peers can help identify broken business processes that are requiring employees to violate policy in order to do their job.
Rafal Los's picture
Who knew Bob Dylan would herald the regular transformation cycles that is information technology?
Joshua Goldfarb's picture
Making the effort to bridge the gap between security practitioners and others is something I am quite passionate about. I present to you, “10 ways to close that security sale”:
Stan Engelbrecht's picture
Post-incident activity is the often-neglected phase where organizations try to answer the questions of what happened, why, and how can we make sure it doesn’t happen again?
David Holmes's picture
Take a step back and realize that cryptocurrency mining is really just another form of malware, which is something you should be good at finding already.
Josh Lefkowitz's picture
With so many intelligence offerings, it’s important for prospective consumers to have a sense of what intelligence—if any—a vendor actually provides.