Security Experts:

Management & Strategy
long dotted


Microsoft this week announced two new features meant to improve the security of priority accounts in Microsoft 365. [Read More]
E-commerce fraud prevention company Forter has achieved “unicorn” status after raising $125 million in a Series E funding round. [Read More]
While the ISC2 figures show the workforce gap narrowing slightly, we cannot assume from this that the cybersecurity skills gap is narrowing. [Read More]
State-sponsored programs from China, Russia, Iran and North Korea pose the greatest high-tech threats to Canada, a report from the nation's authority on cyber security warned Wednesday. [Read More]
Email security solutions provider Abnormal Security on Wednesday announced raising $50 million in a Series B funding round, which brings the total raised by the company to $75 million. [Read More] emerges from stealth mode with an authorization policy management platform and $6 million in seed funding. [Read More]
President Donald Trump on Tuesday fired the nation’s top election security official, a widely respected member of his administration who had dared to refute the president’s unsubstantiated claims of electoral fraud and vouch for the integrity of the vote. [Read More]
The IoT Cybersecurity Improvement Act, which aims to improve the security of IoT devices, has passed the Senate and is heading to the White House for the president’s signature. [Read More]
Zoom over the weekend rolled out two new features that are aimed at tackling meeting disruptions. [Read More]
FireEye Mandiant has delivered its cyber landscape predictions for the coming year, including growing and affiliate-supported espionage, increased targeting of OT by ransomware, and continued targeting of healthcare. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Torsten George's picture
The risk of company employees walking away with sensitive data or selling their access credentials has never been greater now that a record number of individuals have been laid off.
Galina Antova's picture
The COVID-19 crisis and its associated constraints has shown us that many of the activities we considered “priorities” before March are not really priorities.
Marc Solomon's picture
While it may be a trendy term, in cybersecurity, intelligence pivoting is pivotal to detection and response.
Joshua Goldfarb's picture
A healthy dose of self-doubt can go a long way towards keeping us on our toes and continually improving the security posture of our respective organizations.
Galina Antova's picture
As digital transformation and cybersecurity become pillars that successful companies will build their futures on, the time has come to include CISOs and CIOs on company boards.
Idan Aharoni's picture
The term "Threat Intelligence" encompasses an ever-growing set of offerings that, on an operational standpoint, have different use cases.
Rafal Los's picture
If you're not allocating time to develop strong operational process - integrations and workflows - you're never going to solve the problem you're trying to solve.
Marc Solomon's picture
Security tools need to integrate with a centralized repository of relevant, prioritized threat intelligence, and with all your security controls.
Matt Morris's picture
Companies must instill a culture of resilience in which security improvements are emphasized as a fundamental component of an organization’s individual corporate culture
Joshua Goldfarb's picture
In security, having a plan is important. That being said, there are times when a given plan may no longer be appropriate or effective.