Security Experts:

Management & Strategy
long dotted


Cloud security firm Bitglass raises $70 million in a Series D funding round, which brings the total raised by the company to over $150 million. [Read More]
The Czech Republic’s highest court says a former justice minister violated the rights of an alleged Russian hacker by allowing his extradition to the U.S. before a separate asylum case was finalized. [Read More]
An analysis of the reservation systems used by 1,500 hotels revealed that over two-thirds expose user information and allow attackers to cancel bookings. [Read More]
The tools and TTPs used by the threat group behind the Triton/Trisis malware show that the hackers are focused on maintaining access to compromised systems. [Read More]
Minnesota Department of Human Services officials say a data breach at the agency may have exposed the personal information of about 11,000 people. [Read More]
New details emerge about the malware stored on the USB drive carried by the Chinese woman arrested at President Donald Trump’s Mar-a-Lago club. [Read More]
Fleetsmith, a company that provides Apple device management solutions, raises $30 million in a Series B funding round. [Read More]
Cyber risk management company RiskLens raises $20 million in Series B funding round, which brings the total raised by the firm to over $27 million. [Read More]
In his annual letter to shareholders, JPMorgan CEO Jamie Dimon endorses cloud, confirms the growing use and value of artificial intelligence (AI), prefers a federal privacy law, and describes the importance of cybersecurity. [Read More]
The UK government has published its fourth annual breaches survey: the Cyber Security Breaches Survey 2019. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Josh Lefkowitz's picture
The best way for intelligence practitioners to identify what types of context their intelligence consumers truly need is simply to ask them.
Alastair Paterson's picture
By understanding where assets are exposed, their value to attackers, and how attackers target this data, organizations can make better decisions about their defenses and improve them over time.
Grady Summers's picture
There are many pitfalls, and some simple rules that can help you make smarter decisions if you are in looking to purchase security products seen at RSA Conference.
Marc Solomon's picture
As a security professional, wouldn’t it be great to be able to focus on one thing at a time and know you’re focused on the right things to protect the organization?
Ashley Arbuckle's picture
Through market consolidation, organizations can derive exponentially more value from their security tools.
John Maddison's picture
While many organizations are struggling to secure their diverse, complex, and rapidly expanding networks, they are now facing a new challenge created by convergence.
Josh Lefkowitz's picture
Josh Lefkowitz shares—and debunks—some of the most persistent and misleading BRI fallacies he has heard over the years.
Alastair Paterson's picture
Organizations’ perimeters will continue to erode as their digital footprints expand, but with the right risk protection strategy any organization can succeed in the age of digital transformation.
Grady Summers's picture
Companies in China are facing many of the same threats that your organization faces today, but they are addressing these threats at a massive scale, on emerging platforms, and with innovative approaches that we can learn from.
Marc Solomon's picture
The ability to customize threat intelligence scores allows you to prioritize threats to your organization and reevaluate and reprioritize as new data and context becomes available.