Security Experts:

Management & Strategy
long dotted


What you need to know about the Foreshadow / L1TF vulnerabilities affecting Intel CPUs, including impact and affected vendor responses [Read More]
U.S. Department of Defense invites experts to hack the Marine Corps in new bug bounty program [Read More]
The Internet Engineering Task Force (IETF) publishes Transport Layer Security (TLS) 1.3 as RFC 8446 [Read More]
The intent of Microsoft's Cybersecurity Policy Framework is good; but whether it is feasible is questionable. [Read More]
G Suite administrators can keep an eye on account actions that seem suspicious and can also opt in to receive alerts when critical actions are performed. [Read More]
Critical vulnerabilities discovered in smart city systems can be exploited by hackers to cause panic, researchers warn [Read More]
Salk Lake City-based RiskRecon has raised $25 million in Series B financing to expand its third-party cyber risk management business. [Read More]
Hackers obtained some source code for the iOS version of Snapchat and made it public on GitHub after claiming that the company ignored them [Read More]
Former Tesla employee Martin Tripp is seeking at least $1 million in defamation damages after it accused him of hacking into computers and stealing confidential information leaked to the media. [Read More]
In an effort to improve the safety of its users, GitHub is now alerting them whenever it detects their passwords have been compromised. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Stan Engelbrecht's picture
If you know you want to improve your security operations, but don’t know where to start, here are a few steps that can help get you ready for a security orchestration, automation, and response (SOAR) platform.
Erin O’Malley's picture
Like big game hunting, cyber threat hunting is not easy and requires a unique mix of hard-earned skills and intelligence.
Torsten George's picture
The Reddit data breach illustrates the importance of rolling out an approach designed to verify the user, validate their device, limit access and privilege, and learn and adapt to new risks.
Josh Lefkowitz's picture
Proper evaluation of business risk requires insight into the likelihood that a vulnerability will be exploited, and if exploited, how that vulnerability could impact the company on a macro level.
Laurence Pitt's picture
People are becoming complacent and ignoring the basic lessons we learned decades ago. Technology has advanced immensely since 1990 when the term “cybersecurity” arrived on the scene.
Preston Hogue's picture
To combat today’s constantly innovative information warfare, CISOs need diversity on their teams, because everyone has their expertise, but also their blind spots.
Joshua Goldfarb's picture
Whether you’re speaking at a conference, presenting in a meeting, working the room at an industry session, or otherwise, researching the audience pays huge dividends.
Stan Engelbrecht's picture
Security orchestration, automation, and response (SOAR) tools are increasingly effective for some of today’s most pressing security problems, which has led to growing demand across enterprise organizations.
Torsten George's picture
Cyber attackers long ago figured out that the easiest way for them to gain access to sensitive data is by compromising an end user’s identity and credentials.
Justin Fier's picture
The security skills shortage will continue to worsen unless organizations come to fundamentally rethink the current hiring model and job requirements.