Security Experts:

Management & Strategy
long dotted


The ICS vendors whose products are affected by the OT:Icefall vulnerabilities have started releasing advisories. [Read More]
The personal information of more than one million patients was impacted in a March 2022 incident at patient care guidelines provider MCG Health. [Read More]
Firmware supply chain security company Binarly has announced a $3.6 million seed funding round led by Westwave Capital and Acrobator Ventures. [Read More]
Aqua Security releases open source tool for auditing the software supply chain to ensure compliance with newly created CIS guidelines. [Read More]
Cyberint, a threat intelligence startup competing in the attack surface management category, has raised $40 million in financing led by StageOne Late Stage Arm. [Read More]
SYN Ventures is leading a $23 million Series A investment in RevealSecurity, a startup building technology to thwart malicious insider threats. [Read More]
The deep tech company has received new investment from Elaia Partners and La Banque Postale’s 115K innovation fund. [Read More]
A survey conducted by Fortinet shows that over 40% of cybersecurity incidents at OT organizations resulted in operational outages that put physical safety at risk. [Read More]
Nearly 30 cybersecurity M&A deals were announced in the first half of June 2022, the highest number since SecurityWeek has been tracking M&A activity. [Read More]
Disguised as a cryptocurrency miner, Malibot focuses on stealing financial information, cryptocurrency wallets, and personally identifiable information (PII). [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Joshua Goldfarb's picture
If you know for a fact that a person or group has poor intentions, it may make sense to begin documenting and reporting nefarious activity you observe from them.
Landon Winkelvoss's picture
Many think open source intelligence is just another name for better googling. They are wrong. Good open source and threat intelligence are derived from three core capabilities.
Keith Ibarguen's picture
Vendor agnostic technology, married with actionable, globally-sourced, and continually evolving intelligence, augmented by humans, is needed to defend our enterprises.
Laurence Pitt's picture
There are areas where governments can learn from the private sector and vice-versa, which will help both sides adapt more quickly and effectively to a continuously evolving threat environment.
William Lin's picture
I foresee a convergence of the tooling for telemetry aggregation, threat detection, managed services and remediation as a key milestone in the evolution of the modern SOC.
Marc Solomon's picture
A conversation with Callie Guenther, cyber threat intelligence (CTI) manager at Critical Start.
Joshua Goldfarb's picture
While we may not be able to fix the organizational issues created by a “Peter”, by identifying the signs that we are working for one, we can often adjust how we work to compensate.
Marc Solomon's picture
By scoping job descriptions realistically and incorporating automation and intelligence sharing to enable analyst success and growth, there’s a lot that security leaders can do to help close the skills gap in their organizations.
Laurence Pitt's picture
SASE is gaining momentum and can ensure that users receive the correct, risk-based level of access to systems at any moment in time.
Gordon Lawson's picture
While employees want to do the right thing when it comes to protecting their organization from cyber threats, we cannot expect them to be perfect.