Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

U.S. Department of Energy lays out its multiyear cybersecurity plan, which includes strengthening preparedness, coordinating incident response and recovery, and accelerating RD&D [Read More]
White House eliminates cybersecurity coordinator role following the departure of Rob Joyce. Lawmakers and cybersecurity experts are not happy with the decision [Read More]
As the adoption of open source components soars, vulnerabilities in this type of software have become increasingly common and they can pose a serious risk to applications, Synopsys study shows [Read More]
Symantec shares more information on the internal investigation announced last week. Company’s stock gained nearly 10% on Monday [Read More]
EFAIL: researchers say they’ve found ways to steal plain text from emails encrypted with OpenPGP and S/MIME, but some believe the claims are overblown [Read More]
Undisclosed number of Chili’s restaurants had their payment systems infected with data-stealing malware [Read More]
Symantec stock fell roughly 20 percent on Thursday after the company announced an internal investigation that will likely delay its annual report to the SEC [Read More]
Cyber insurance firm At-Bay has raised $13 million in Series A funding, which brings the company’s total funding to $19 million. [Read More]
Kaspersky researchers find a significant number of vulnerabilities in OPC UA, a widely used industrial communications protocol [Read More]
"Our society has not yet embraced cybersecurity as a civilization-defining competency, yet it is exactly central to our capacity to function in this massively technological age," ProtectWise CTO Gene Stevens told SecurityWeek. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Joshua Goldfarb's picture
We can all be more understanding of people when they do exactly what we incentivize them to do. To that point, I offer “10 security behaviors that anger us, but that we incentivize".
Marc Solomon's picture
It is important for threat intelligence analysts, SOCs and incident responders to work together to take the right actions faster, reducing the time to response and remediation.
Ashley Arbuckle's picture
We have an opportunity to expand the pool of workers and improve security and financial performance in the process, with teams that are based on inclusion and diversity.
Bradon Rogers's picture
While a contract, distributed, partner-oriented workforce and supply chain can create serious risks to your organization, careful implementation of visibility and data protection strategies can help you mitigate many of the risks.
Josh Lefkowitz's picture
Before finalizing a vendor relationship, it’s crucial to construct a response plan in preparation for any future incidents the vendor might experience.
Rafal Los's picture
If you're not careful, security becomes a hinderance and a target. Where security leaders create inflexible environments, security tends to struggle.
Steven Grossman's picture
Without an understanding of where you stand today, new security tools will result in more redundancy and gaps in protection.
Marc Solomon's picture
The industry needs to share a common understanding of how to put threat intelligence into practice to address some of our thorniest security operations challenges.
Ashley Arbuckle's picture
Edna Conway, Cisco’s Chief Security Officer, Global Value Chain, discusses mitigating third-party security risk across an ecosystem that includes tens of thousands of partners located around the globe.
Jim Ivers's picture
More vulnerabilities create more attacks; more attacks breed additional fatigue. So how can we wake up and fix the problems creating such a widespread headache?