Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Apple is making its bug bounty program public, it’s expanding it to cover macOS and other products, and it’s increasing the top reward to $1 million. [Read More]
Researchers have catalogued most known Windows process injection techniques and discovered a new one, which they say is stealthy and can bypass all Microsoft protections. [Read More]
The United States unveiled rules on formally banning technology giant Huawei and other Chinese firms from government contracts in the latest move in the countries' escalating trade war. [Read More]
Vulnerabilities in Microsoft’s Azure cloud services are now worth up to $40,000, and a new security testing environment gives researchers the chance to conduct aggressive tests and earn $300,000. [Read More]
Global privacy regulators joined forces Tuesday to demand guarantees from Facebook on how it will protect users' financial data when it launches its planned cryptocurrency, Libra. [Read More]
Several major industrial and automation solutions providers have responded to the Wind River VxWorks vulnerabilities dubbed Urgent/11. [Read More]
Leaders of House and Senate committees want Capital One and Amazon to explain how a hacker accessed information on more than 100 million Capital One credit card customers and applicants. [Read More]
Tom Kellermann agues that defenders need to recognize the new reality and to start thinking about a modern persistent cognitive attack loop rather than a linear attack chain. [Read More]
With the school year beginning next week, a fourth Louisiana school district is assessing damage caused by hackers targeting its computer network. [Read More]
One of the country's biggest credit card issuers, Capital One Financial, is the latest big business to be hit by a data breach, disclosing that roughly 100 million people had some personal information stolen by a hacker. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

David Holmes's picture
Architects and IT security teams are looking for technology evolutions to help them manage real problems in endpoint storage and messaging.
Jim Gordon's picture
Intel's Jim Gordon explains how he set an example as one of a small handful of “male majority” leaders to help advance Diversity and Inclusion (D&I) efforts.
Ashley Arbuckle's picture
Shifting to a proactive approach to incident response (IR) is critical but identifying partners who can provide the capabilities you need is a challenging task.
Marc Solomon's picture
We can make the Security Operations Center (SOC) a powerhouse by tearing down walls between the various security groups in an organization.
Joshua Goldfarb's picture
Wild salmon face predators, such as grizzly bears, bald eagles, and sport fishermen. And yet, through it all, they remain focused on returning “with uncanny precision to the natal river where they were born.”
Devon Kerr's picture
How healthcare organizations used a trail of digital evidence to identify the type of attack they were experiencing and developed a remediation strategy.
Alastair Paterson's picture
Diversity of thought fosters psychological safety, which is a shared belief among teams that they perceive they are safe to take risks, and is one of the core indicators of highly effective teams.
Jim Gordon's picture
While I have blogged pretty frequently in the past, this is my first official column for any sort of major publication, and I am grateful for the opportunity from SecurityWeek.
Marc Solomon's picture
Security teams should be able to detect threats faster and use that knowledge to pivot and accelerate parallel investigations that are separate but related.
Ashley Arbuckle's picture
The convergence of security products and services is a welcomed development and will lead to improved security.