Security Experts:

Management & Strategy
long dotted


Instagram informs some users that their passwords may have been exposed as a result of using the “Download Your Data” tool [Read More]
Singapore signs cybersecurity agreements with Canada and the United States [Read More]
Hackers earned over $1 million at the Tianfu Cup hacking competition in China after demonstrating exploits against products from Microsoft, Apple, Google, VMware, Oracle, Adobe and others [Read More]
A Japanese minister in charge of cyber security has provoked astonishment by admitting he has never used a computer in his professional life, and appearing confused by the concept of a USB drive. [Read More]
Europol and ATM maker Diebold Nixdorf sign a memorandum of understanding for exchanging information and expertise on cyber threats [Read More]
Trend Micro and Moxa announce TXOne Networks, a joint venture focusing on securing Industrial Internet of Things (IIoT) environments [Read More]
U.S. Office of Personnel Management (OPM) has improved its security posture since the data breaches disclosed in 2015, but many issues are still unresolved, GAO says in a report [Read More]
Congress passes Cybersecurity and Infrastructure Security Agency (CISA) Act, which creates a new cybersecurity agency at the DHS [Read More]
Industrial cybersecurity firm Dragos raises $37 million, which it will use to accelerate growth of its software platform, threat intelligence, and threat operations services [Read More]
Cathay Pacific apologized for the firm's handling of the world's biggest airline hack that saw millions of customers' data breached but denied trying to cover it up. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Joshua Goldfarb's picture
Organizations need to continually evaluate where each effort stands in relation to its allotted budget and schedule, along with the value it brings to the organization’s security posture.
Mike Fleck's picture
A small business with one running all of IT, cannot defend against cyber-attacks from the North Korean military with the same vigor as Lockheed Martin or Northrup Grumman.
Marc Solomon's picture
Adversaries are increasingly masterful at taking advantage of these seams between technologies and teams to infiltrate organizations and remain below the radar.
Torsten George's picture
Like the NIST Cybersecurity Framework, it integrates relevant regulations (e.g., HIPAA) and standards (NIST 800-53, ISO 27001, PCI DSS) into a single overarching security framework.
Lance Cottrell's picture
If strategic thinking, introspection, re-focusing, and hard truths sound worth the effort, the next question is how to make sure you get that value from your Security Advisory Board (SAB).
Josh Lefkowitz's picture
There’s no point in having billions of data points if those data points aren’t timely, accurate, actionable, and adequately map to your intelligence objectives and requirements.
Erin O’Malley's picture
Like dog bites, the negative impact of cyber incidents can go from bad to worse quickly—and the first 48 hours are critical.
Joshua Goldfarb's picture
Here are few ways in which organizations can work smarter, rather than harder to improve their information security postures in a resource-constrained environment.
Nick Sanna's picture
Board members and senior management are likely to wave off CISO techno-speak and push to get their questions answered on their terms.
Ashley Arbuckle's picture
Whether you work with in-house security resources or outside consultants, you must make sure you involve the right people with the right skill sets from the start, so you can capitalize on the value of security DevOps to your security architecture.