Security Experts:

Management & Strategy
long dotted


Google faces fresh regulatory scrutiny in Britain over plans to revamp its ad data system, after an industry lobbying group complained to the competition watchdog that the changes would cement the U.S. tech giant’s online dominance. [Read More]
Canadian Prime Minister Justin Trudeau -- under pressure from the opposition to ban Huawei from the country's 5G networks -- refused to say Tuesday when he might make his decision, or if it would come before year's end. [Read More]
Cybersecurity solutions provider Trend Micro this week announced the release of a free tool designed to help users boost their privacy online and fight misinformation. [Read More]
Industry reactions to President Donald Trump firing CISA Director Christopher Krebs after he refuted claims of electoral fraud and vouched for the election. [Read More]
Apple confirmed Thursday it would press ahead with mobile software changes that limit tracking for targeted advertising -- a move that has prompted complaints from Facebook and others. [Read More]
Microsoft this week announced two new features meant to improve the security of priority accounts in Microsoft 365. [Read More]
E-commerce fraud prevention company Forter has achieved “unicorn” status after raising $125 million in a Series E funding round. [Read More]
While the ISC2 figures show the workforce gap narrowing slightly, we cannot assume from this that the cybersecurity skills gap is narrowing. [Read More]
State-sponsored programs from China, Russia, Iran and North Korea pose the greatest high-tech threats to Canada, a report from the nation's authority on cyber security warned Wednesday. [Read More]
Email security solutions provider Abnormal Security on Wednesday announced raising $50 million in a Series B funding round, which brings the total raised by the company to $75 million. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

AJ Nash's picture
Knowing that threat intelligence is readily available and proving its worth is one thing, understanding how to use it within your security operations program is quite another.
Marc Solomon's picture
When intelligence becomes a capability and not just subscriptions to feeds, we can gain the full value of intelligence as the foundation to security operations.
Torsten George's picture
Today’s dynamic threatscape requires security professionals to adjust to an ever-expanding attack surface.
Joshua Goldfarb's picture
I have noticed some common threads that run through both good and bad advice, particularly in the security field.
Derek Manky's picture
It’s amazing how foundational security principles, consistently implemented, can help defeat the craftiest attack vector.
Idan Aharoni's picture
As organizations’ visibility is limited to what their threat intelligence vendors cover, by definition they will never have full visibility.
Laurence Pitt's picture
Remote workers must take additional responsibility for keeping data safe from attacks, but it is the role of the company to provide training, awareness and tools to make this happen.
Marc Solomon's picture
To gather the data and intelligence you need to fully detect and respond to threats, you need the ability to scale up and down the pyramid.
John Maddison's picture
By understanding the latest threat trends, security teams can take measures to ensure that their security strategies, including the identification and tracking of new IOCs, are being correctly updated.
Torsten George's picture
The risk of company employees walking away with sensitive data or selling their access credentials has never been greater now that a record number of individuals have been laid off.