Security Experts:

Management & Strategy
long dotted


G Suite administrators can keep an eye on account actions that seem suspicious and can also opt in to receive alerts when critical actions are performed. [Read More]
Critical vulnerabilities discovered in smart city systems can be exploited by hackers to cause panic, researchers warn [Read More]
Salk Lake City-based RiskRecon has raised $25 million in Series B financing to expand its third-party cyber risk management business. [Read More]
Hackers obtained some source code for the iOS version of Snapchat and made it public on GitHub after claiming that the company ignored them [Read More]
Former Tesla employee Martin Tripp is seeking at least $1 million in defamation damages after it accused him of hacking into computers and stealing confidential information leaked to the media. [Read More]
In an effort to improve the safety of its users, GitHub is now alerting them whenever it detects their passwords have been compromised. [Read More]
A piece of malware caused significant disruptions in factories of TSMC, which supplies chips to Apple and others [Read More]
Google this week announced that it can now alert G Suite admins when it believes users have been targeted by government-backed attackers. [Read More]
Clarkson PLC (Clarksons), a global shipping services firm, has provided an update to the breach it suffered between May and November 2017. [Read More]
Hack of online community site Reddit shows that SMS-based authentication is not nearly as secure as many believe--but it is much better than no second factor authentication protection. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Erin O’Malley's picture
Like big game hunting, cyber threat hunting is not easy and requires a unique mix of hard-earned skills and intelligence.
Torsten George's picture
The Reddit data breach illustrates the importance of rolling out an approach designed to verify the user, validate their device, limit access and privilege, and learn and adapt to new risks.
Josh Lefkowitz's picture
Proper evaluation of business risk requires insight into the likelihood that a vulnerability will be exploited, and if exploited, how that vulnerability could impact the company on a macro level.
Laurence Pitt's picture
People are becoming complacent and ignoring the basic lessons we learned decades ago. Technology has advanced immensely since 1990 when the term “cybersecurity” arrived on the scene.
Preston Hogue's picture
To combat today’s constantly innovative information warfare, CISOs need diversity on their teams, because everyone has their expertise, but also their blind spots.
Joshua Goldfarb's picture
Whether you’re speaking at a conference, presenting in a meeting, working the room at an industry session, or otherwise, researching the audience pays huge dividends.
Stan Engelbrecht's picture
Security orchestration, automation, and response (SOAR) tools are increasingly effective for some of today’s most pressing security problems, which has led to growing demand across enterprise organizations.
Torsten George's picture
Cyber attackers long ago figured out that the easiest way for them to gain access to sensitive data is by compromising an end user’s identity and credentials.
Justin Fier's picture
The security skills shortage will continue to worsen unless organizations come to fundamentally rethink the current hiring model and job requirements.
Josh Lefkowitz's picture
If an InfoSec team lacks the requisite capabilities, bandwidth, and/or resources to do so, it may inhibit the progress and accuracy of the investigation.