Security Experts:

Management & Strategy
long dotted


Shift5, an OT cybersecurity company that specializes in securing tanks, planes and trains, has raised $20 million in a Series A funding round. [Read More]
Apple has published a 30-page threat analysis report to explain why sideloading would pose serious privacy and security risks to iPhone users. [Read More]
CrowdStrike made two major announcements at its own Fal.Con conference this week, launching a free Community Edition of Humio, and announcing CrowdStrike XDR. [Read More]
The Microsoft Patch Tuesday train for October rolled in with fixes for at least 71 Windows security defects and an urgent warning about a newly discovered zero-day cyberespionage campaign. [Read More]
Full video of panel discussion from SecurityWeek's 2021 CISO Forum on navigating software bill of materials (SBOM) and supply chain security transparency. [Read More]
Cloud security company Wiz has raised $250 million in a Series C funding round. Wiz has raised a total of $600 million and it’s now valued at $6 billion. [Read More]
New guidance encourages administrators to ensure that their environments are not vulnerable to wildcard certificates and ALPACA attacks. [Read More]
Nine cybersecurity-related acquisitions were announced in the first 10 days of October 2021. [Read More]
Most Americans across party lines have serious concerns about cyberattacks on U.S. computer systems and view China and Russia as major threats, according to a new poll. [Read More]
The document was designed to provide federal agencies guidance on securing their networks while allowing remote users access. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Joshua Goldfarb's picture
You may be asking yourself what adopting a pound dog has to do with security. To help answer it, I’d like to share five security lessons that my daughter taught me during a recent conversation on the topic.
Landon Winkelvoss's picture
Ineffective security approaches when integrating two separate organizations can lead to significant issues that could undercut the business value of a merger or acquisition.
Tim Bandos's picture
Before even thinking about approaching a vendor, talk at length about the project amongst yourselves. What problem are you trying to solve and how will you know when you’ve solved it?
Marc Solomon's picture
As you determine what security technologies to invest in, develop not only a technology roadmap, but also include and align an operational roadmap.
Laurence Pitt's picture
For many of us, RSA Conference 2020 in San Francisco was the last time we came together as a community, met with colleagues, and saw new technology offerings.
Rob Fry's picture
By taking some lessons from outside our cybersecurity sandbox, we can address some of the significant challenges in cybersecurity.
Landon Winkelvoss's picture
While cyber due diligence has yet to become commonplace in M&A transactions, the consequences of failing to identify risks and active campaigns can have costly implications.
Gunter Ollmann's picture
In the merry-go-round world of InfoSec technologies and “what’s old is new again,” this year we should include Attack Surface Management with a dash of Continuous.
Torsten George's picture
President Biden's Executive Order (EO) to improve the nation’s cybersecurity is a good first step but it is likely not going to materially change the defensive posture of the nation.
Joshua Goldfarb's picture
Josh Goldfarb analyzes five statements stubborn people often say, discusses how they harm an organization's security posture, and suggests ways forward in each case.