Security Experts:

Management & Strategy
long dotted


U.S. SEC releases updated guidance on data breach disclosures and advises companies to adopt policies that ban executives from trading during security incident investigations [Read More]
Artificial intelligence could be deployed by dictators, criminals and terrorists to manipulate elections and use drones in terrorist attacks, experts say. [Read More]
Intel has released firmware updates for more processors to patch the Spectre vulnerability [Read More]
Vectra Networks has closed a $36 million Series D funding round, bringing the total amount raised to date by the company to $123 million. [Read More]
U.S. Department of Justice creates new cybersecurity task force to help find ways to combat cyber threats and become more efficient in this area [Read More]
Apple updates iOS and macOS to patch flaw that causes devices to crash when displaying certain strings of Indian characters [Read More]
SWIFT attacks: Russia’s Central Bank says one of the country’s financial institutions lost $6 million, and hackers attempted to steal $2 million from India’s City Union Bank [Read More]
More than 30 lawsuits have been filed against Intel by customers and shareholders over the Meltdown and Spectre vulnerabilities [Read More]
BitSight has published an analysis of the security posture of the federal supply chain, which shows a significant gap between the security performance of U.S. federal agencies and their contractors. [Read More]
U.S. Department of Energy announces new Office of Cybersecurity, Energy Security, and Emergency Response (CESER) [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Marc Solomon's picture
With the right technologies and/or services, every organization can get relevant, prioritized threat intelligence how, when and where they need it.
Joshua Goldfarb's picture
I’d like to share some of the observations I’ve made throughout the years around behaviors that aggravate the “culture clash” between salespeople and security practitioners.
Stan Engelbrecht's picture
Responding to an incident can require extreme time-sensitivity and when tensions are running high, it’s easy to miss something important along the way.
Steven Grossman's picture
Symantec Senior VP of Information Protection, Nico Popp speaks to Steven Grossman on the challenges enterprises are facing to support collaboration, cloud adoption, remote connectivity, and mobile computing.
Preston Hogue's picture
The new world of security is a more streamlined model that involves transferring many types of risk—and many of the associated controls—to third parties in a variety of ways.
Justin Fier's picture
The insider threat is under-scrutinized by the security community, leaving networks vulnerable to compromise by their own employees, especially those with privileged access.
Josh Lefkowitz's picture
Real-time intelligence is exceedingly difficult to attain. Many current offerings are limited in how they can address the broad spectrum of threats and adversaries that exist today.
Joshua Goldfarb's picture
When a high profile event like Meltdown/Spectre comes around, organizations need actionable information that they can use to mitigate their risk and get back to worrying about their core business.
Oliver Rochford's picture
Fear Uncertainty and Doubt or FUD, have always played a part in convincing businesses and governments to invest in cybersecurity.
Stan Engelbrecht's picture
The rapidly evolving threat landscape, constantly changing best practices, and surplus of security tools make it easy to overlook important steps during incident response (IR) planning.