Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Federal Communications Commission (FCC) Chairwoman Jessica Rosenworcel proposes strengthening rules around telecom providers’ reporting of data breaches. [Read More]
CYBERCOM shares details and malware attributed to the Iran-linked threat actor MuddyWater. [Read More]
Mozilla fixes multiple high-severity vulnerabilities with the release of Firefox 96, Firefox ESR 91.5, and Thunderbird 91.5. [Read More]
Eureka has emerged from stealth mode with a cloud data security posture management platform and $8 million in seed funding. [Read More]
CISA, FBI and NSA have released a joint cybersecurity advisory providing an overview of cyber operations linked to the Russian government. [Read More]
Researchers have analyzed 16 URL parsing libraries and showed how inconsistencies can lead to various types of vulnerabilities. [Read More]
SecurityWeek editor-at-large Ryan Naraine looks at the ‘great resignation’ currently upending the U.S. labor market and the possible ramifications for cybersecurity programs big and small. [Read More]
The U.S. government has issued a warning over the use of commercial surveillance tools and it has shared some recommendations. [Read More]
Switzerland's army has banned the use of WhatsApp whilst on duty, a spokesman confirmed Thursday, in favour of a Swiss messaging service deemed more secure in terms of data protection. [Read More]
Several U.S. senators have sent a letter to the DHS and DOT to request information on the cybersecurity of transportation infrastructure. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

John Maddison's picture
Cybersecurity deployments have become as complex as the networks they are trying to protect. And that’s not a good thing.
Marc Solomon's picture
An open integration architecture provides the greatest access to data from technologies, threat feeds and other third-party sources, and the ability to drive action back to those technologies once a decision is made.
Gordon Lawson's picture
The rise of social engineering tactics as well as risks associated with embedded vulnerabilities in contractor networks makes keeping this technology confidential and out of the hands of adversaries increasingly difficult.
Joshua Goldfarb's picture
The right to work is one of the most fundamental professional rights. Those who actively threaten or work against this right act against the interests of the security community as a whole.
Keith Ibarguen's picture
I would like to suggest a New Year’s Resolution for my peers in the security industry: Focus on the outcome the other person is seeking, and if you agree with it, help make it happen.
Torsten George's picture
Cyber resiliency measures (i.e., architectural design, technologies, operational practices) assume that today’s threat actors can achieve a foothold in an organization’s infrastructure and in turn post-exploit activities must be contained and eliminated.
Landon Winkelvoss's picture
The security industry must commit to a risk-based approach that understands the specific attacks and actors targeting their industry and profile.
Jeff Orloff's picture
To sharpen and learn cybersecurity skills, security professionals need to ‘play’ in a safe, yet stimulating place that provides hands-on, interactive upskilling.
Marie Hattar's picture
It is a good idea to assume that your network has already been breached, even if no overtly malicious notifications have surfaced.
Marc Solomon's picture
You risk limiting the value you can derive from your next security investment without first thinking about your top use cases and the capabilities needed to address them.