Security Experts:

Management & Strategy
long dotted


The number of US government domains for which security certificates were left to expire due to the government shutdown has exceeded 130. One impacted domain belongs to the White House. [Read More]
Hackers can abuse legitimate features present in industrial controllers to hijack these devices and gain a foothold in a network, a researcher warns. [Read More]
Email security firm Zix will acquire AppRiver, a provider of cloud-based cybersecurity solutions, for $275 million in cash. [Read More]
The founder of Huawei says his company would refuse to disclose secrets about its customers and their communication networks, trying to lay to rest concerns the tech giant might spy for China. [Read More]
A recently published report from the United States Department of Defense (DoD) shows that. while it has improved its stance, it still faces challenges in managing cybersecurity. [Read More]
Cloud security company Sonrai emerges from stealth mode with $18.5 million obtained in a Series A funding round. [Read More]
Schneider Electric has teamed up with Nozomi Networks to offer customers advanced solutions for ICS resiliency and real-time operational visibility. [Read More]
Pwn2Own 2019 introduces automotive category – researchers can earn up to $300,000 and a Tesla Model 3 if they hack a Tesla. [Read More]
Check Point acquires ForceNock, a company specializing in securing web applications and APIs. [Read More]
Mondelez International filed suit against Zurich American Insurance Company over a $100 million insurance claim for damage caused by NotPetya, citing the fairly standard 'act of war' exclusion in many insurance policies. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Josh Lefkowitz's picture
A business risk intelligence (BRI) program needs to understand and account for the different categories of risk faced by all business functions across an enterprise.
Alastair Paterson's picture
Organizations that continuously monitor their digital footprint and understand their online exposure will be the most effective at mitigating digital risk in the new year.
Joshua Goldfarb's picture
Before implementing a new process, making a big decision, or changing policies and procedures, you should seek a second opinion.
Ashley Arbuckle's picture
As security professionals, we must keep learning from and building on these top five trends to create a more secure future.
Marc Solomon's picture
Most organizations have more intelligence than they know what to do with. What’s lacking is a way to aggregate all this data in one manageable location where it can be translated into a uniform format for analysis and action.
Lance Cottrell's picture
We spend a lot of time thinking about and trying to mitigate threats that are so extreme you are basically already doomed if they are ever used against you.
Jalal Bouhdada's picture
In the event of a cybersecurity incident in an industrial environment, you should follow a well-established seven step response process.
Laurence Pitt's picture
Failure to implement basic cybersecurity hygiene practices will leave retailers vulnerable to damage and fines during a lucrative time for their businesses.
Alastair Paterson's picture
As you develop a brand protection program, here are five concrete things you can do now to proactively identify and mitigate risk to your brand.
Lance Cottrell's picture
It is important to take a systematic approach to creating your Security Advisory Board (SAB). Don’t just invite the smartest, most famous people you happen to know and like.