Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

ESET has partnered with Myers-Briggs to examine the relationship between staff personality traits (their MBTI) and cyber behaviors. [Read More]
The FBI is looking for outside contractors to monitor social media for potential threats, setting up a possible conflict with Facebook and other companies over privacy. [Read More]
McAfee acquires NanoSec to strengthen the container security capabilities of its MVISION Cloud and MVISION Server Protection products. [Read More]
Apple is making its bug bounty program public, it’s expanding it to cover macOS and other products, and it’s increasing the top reward to $1 million. [Read More]
Researchers have catalogued most known Windows process injection techniques and discovered a new one, which they say is stealthy and can bypass all Microsoft protections. [Read More]
The United States unveiled rules on formally banning technology giant Huawei and other Chinese firms from government contracts in the latest move in the countries' escalating trade war. [Read More]
Vulnerabilities in Microsoft’s Azure cloud services are now worth up to $40,000, and a new security testing environment gives researchers the chance to conduct aggressive tests and earn $300,000. [Read More]
Global privacy regulators joined forces Tuesday to demand guarantees from Facebook on how it will protect users' financial data when it launches its planned cryptocurrency, Libra. [Read More]
Several major industrial and automation solutions providers have responded to the Wind River VxWorks vulnerabilities dubbed Urgent/11. [Read More]
Leaders of House and Senate committees want Capital One and Amazon to explain how a hacker accessed information on more than 100 million Capital One credit card customers and applicants. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

David Holmes's picture
Architects and IT security teams are looking for technology evolutions to help them manage real problems in endpoint storage and messaging.
Jim Gordon's picture
Intel's Jim Gordon explains how he set an example as one of a small handful of “male majority” leaders to help advance Diversity and Inclusion (D&I) efforts.
Ashley Arbuckle's picture
Shifting to a proactive approach to incident response (IR) is critical but identifying partners who can provide the capabilities you need is a challenging task.
Marc Solomon's picture
We can make the Security Operations Center (SOC) a powerhouse by tearing down walls between the various security groups in an organization.
Joshua Goldfarb's picture
Wild salmon face predators, such as grizzly bears, bald eagles, and sport fishermen. And yet, through it all, they remain focused on returning “with uncanny precision to the natal river where they were born.”
Devon Kerr's picture
How healthcare organizations used a trail of digital evidence to identify the type of attack they were experiencing and developed a remediation strategy.
Alastair Paterson's picture
Diversity of thought fosters psychological safety, which is a shared belief among teams that they perceive they are safe to take risks, and is one of the core indicators of highly effective teams.
Jim Gordon's picture
While I have blogged pretty frequently in the past, this is my first official column for any sort of major publication, and I am grateful for the opportunity from SecurityWeek.
Marc Solomon's picture
Security teams should be able to detect threats faster and use that knowledge to pivot and accelerate parallel investigations that are separate but related.
Ashley Arbuckle's picture
The convergence of security products and services is a welcomed development and will lead to improved security.