Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Siemens has teamed up with Alphabet-owned cybersecurity company Chronicle to provide industrial monitoring and detection solutions for the energy sector. [Read More]
Moody's has revised its Equifax outlook from stable to negative, citing the effect of the 2017 data breach. This is the first time that a cybersecurity incident has resulted in a Moody's outlook downgrading. [Read More]
LinkedIn has once again put user data and privacy at risk by allowing a TLS certificate to expire. [Read More]
Autonomous threat hunting company Hunters.AI emerges from stealth mode with $5.4 million in seed funding. [Read More]
The European Union on Friday adopted powers to punish those outside the bloc who launch cyberattacks that cripple hospitals and banks, sway elections and steal company secrets or funds. [Read More]
Washington has warned that Chinese-made drones could be giving spy agencies in Beijing "unfettered access" to stolen data, according to a report in American media. [Read More]
Siemplify, a provider of security orchestration, automation and response (SOAR) tools, has secured $30 million in a Series C funding round led by Georgian Partners. [Read More]
Huawei has promised to continue delivering Android security updates to existing phones and tablets after Google suspended business with the Chinese company. [Read More]
TeamViewer confirms it was hacked in 2016 -- likely by Chinese cyberspies -- but the company decided not to make the breach public as it found no evidence that it affected users. [Read More]
Hackers had access to Stack Overflow systems for nearly a week before the attack was detected and some user data was exposed after all. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Marc Solomon's picture
Marc Solomon reviews the list of five characteristics to see how Gartner defined an intelligence-driven SOC four years ago and compare that list to where we are today.
Ashley Arbuckle's picture
Even if SMBs don’t have the resources for a comprehensive security assessment and possible overhaul, incremental change is better than none.
Gunter Ollmann's picture
CISOs should invest time in applying the resources of public cloud to bring automation, scalability, and AI to solving the given problem as a platform for all customers – past, present, and future.
Justin Fier's picture
As innovative attacks continue to expand the purview of cyber security, helping CISOs means equipping them with equally innovative tools that stand a fighting chance.
Joshua Goldfarb's picture
In addition to crossword puzzles being fun, they can also help us learn a number of different information security lessons.
Devon Kerr's picture
Organizations should plan beyond initial compromise and invest in technologies, personnel and methods that foster a more complete understanding.
Marc Solomon's picture
With a platform that can act as a virtual cybersecurity situation room, teams and team members can share the same pool of threat data and evidence to conduct investigations collaboratively.
Stan Engelbrecht's picture
Security teams should always be on the lookout for ways to become more proactive by predicting and anticipating their adversaries’ next moves
Torsten George's picture
Shifting traditional perimeter-based enterprise security strategies to a Zero Trust approach provides more robust prevention, detection, and incident response capabilities to protect continuously expanding attack surfaces.
Joshua Goldfarb's picture
There are certainly no shortcuts and no easy fixes for retaining top security talent. While the list of recommendations on this topic is lengthy, showing security talent that it is respected is high on that list.