Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

DoControl has emerged from stealth mode with an automated SaaS security platform and more than $13 million in funding. [Read More]
Security startup Randori releases Target Temptation to help pinpoint the ‘attackability’ of the assets in an enterprise network. [Read More]
President Joe Biden has selected former senior NSA officials, Chris Inglis and Jen Easterly, for key cyber roles in his administration, the White House said. [Read More]
Eleven cybersecurity-related acquisitions and mergers were announced April 1-11, 2021. [Read More]
Federal Reserve chairman Jerome Powell said he was more worried about the risk of a large-scale cyberattack than another financial crisis like that of 2008. [Read More]
Tines, an Irish company that provides no-code automation solutions for security and operations teams, has raised $26 million at a valuation of $300 million. [Read More]
The South Korean company plans to exit the mobile phone market this summer, but will continue to support existing premium devices, for up to three years. [Read More]
Pwn2Own 2021 has come to an end, with participants earning more than $1.2 million for exploits in the browsers, virtualization, server, enterprise communications and privilege escalation categories. [Read More]
Threat actors are abusing organizations’ reliance on communication services such as Discord and Slack to circumvent network protections and ensure effectiveness of attacks. [Read More]
Cisco patches a critical vulnerability in an SD-WAN software product but warned that a different high-risk bug in end-of-life small business routers will remain unpatched. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Gordon Lawson's picture
Everyone is familiar with the three legs of cybersecurity stool: people, processes and technology. But most companies typically invest in just one area – technology.
AJ Nash's picture
Even if the best strategies and policies are created and uniformly agreed upon across all government and private sector domains, none of that will matter if the talent to execute does not exist.
Tim Bandos's picture
While it’d be impossible to dig into all of the requests I’ve received over the years, here are some of the types of requests we’ve received that may make sense for you to ask your own managed security provider.
Gunter Ollmann's picture
Once live stomping around vendor-packed expo halls at security conferences returns, it is highly probable that “Virtual Analyst” will play a starring role in buzzword bingo.
William Lin's picture
“What’s hot right now in security?” is one of the most common questions I hear from CISOs, vendors and VCs alike.
Marc Solomon's picture
To gain a comprehensive understanding of the threats you are facing and what you must defend, you need to start by aggregating internal data from across the entire ecosystem
Torsten George's picture
Cyber resilience can be considered a preventive measure to counteract human error, malicious actions, and decayed, insecure software.
Yaniv Vardi's picture
Supply chain cyber risk is complicated and spans the entire lifecycle of a product—across design, manufacturing, distribution, storage, and maintenance.
Marc Solomon's picture
The center of gravity of the Security Operations Center (SOC) used to be the SIEM, but this is shifting as the mission of the SOC shifts to become a detection and response organization.
Marc Solomon's picture
The pandemic has resulted in security team members and teams working better together, as well as more closely with other departments and with industry sharing groups.