Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

A survey of over 650 people from organizations of all sizes in various sectors reveals the security, safety and privacy challenges and concerns related to IT/OT/IIoT convergence. [Read More]
Huawei's top executive in Europe brushed off Western critics and defended the company's track record against accusations that it could serve as front for Chinese spying. [Read More]
Apple has finally released an iOS update that should fully patch the Group FaceTime bug that could have been exploited to spy on users. [Read More]
Australia's parliament said that its computer network had been compromised by an unspecified "security incident" and said an investigation was under way. [Read More]
Illumio, a company that specializes in securing data centers and cloud environments through micro-segmentation, has raised $65 million in a Series E funding round, which brings the total raised to date to over $332.5 million. [Read More]
Germany's competition authority says Facebook users should be asked for consent before data collected by the group's subsidiaries Whatsapp and Instagram and on third-party websites is combined with their social network account [Read More]
Netography, a network security solutions provider founded by DDoS mitigation and network security experts, emerges from stealth with $2.6 million in seed funding. [Read More]
France will soon make proposals to reinforce the security of mobile telephone networks, after the US stepped up pressure on Europe to block China's Huawei from building 5G networks. [Read More]
There have been more than 59,000 personal data breaches reported to European data protection regulators in the first eight months following the enforcement of GDPR. [Read More]
Two members of the U.S. House of Representatives have sent a letter to Apple to obtain some clarifications on how the tech giant handled the recently disclosed FaceTime spying bug. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Lance Cottrell's picture
We spend a lot of time thinking about and trying to mitigate threats that are so extreme you are basically already doomed if they are ever used against you.
Jalal Bouhdada's picture
In the event of a cybersecurity incident in an industrial environment, you should follow a well-established seven step response process.
Laurence Pitt's picture
Failure to implement basic cybersecurity hygiene practices will leave retailers vulnerable to damage and fines during a lucrative time for their businesses.
Alastair Paterson's picture
As you develop a brand protection program, here are five concrete things you can do now to proactively identify and mitigate risk to your brand.
Lance Cottrell's picture
It is important to take a systematic approach to creating your Security Advisory Board (SAB). Don’t just invite the smartest, most famous people you happen to know and like.
Marc Solomon's picture
How do we break this wasteful cycle and enable teams and technologies to reduce instances of false positives? The answer lies in prioritization and learning.
Josh Lefkowitz's picture
It’s relatively commonplace for CTI and incident response teams to establish a coordinated response plan in preparation for a cyber attack, but—as demonstrated by WannaCry—it’s imperative for physical security teams to be involved in such plans as well.
Stan Engelbrecht's picture
By highlighting phishing, which causes so many headaches for all us security professionals, you can see just how much of a game-changer automation can be for any SOC or CSIRT.
Joshua Goldfarb's picture
Organizations need to continually evaluate where each effort stands in relation to its allotted budget and schedule, along with the value it brings to the organization’s security posture.
Mike Fleck's picture
A small business with one running all of IT, cannot defend against cyber-attacks from the North Korean military with the same vigor as Lockheed Martin or Northrup Grumman.