Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Symantec shares more information on the internal investigation announced last week. Company’s stock gained nearly 10% on Monday [Read More]
EFAIL: researchers say they’ve found ways to steal plain text from emails encrypted with OpenPGP and S/MIME, but some believe the claims are overblown [Read More]
Undisclosed number of Chili’s restaurants had their payment systems infected with data-stealing malware [Read More]
Symantec stock fell roughly 20 percent on Thursday after the company announced an internal investigation that will likely delay its annual report to the SEC [Read More]
Cyber insurance firm At-Bay has raised $13 million in Series A funding, which brings the company’s total funding to $19 million. [Read More]
Kaspersky researchers find a significant number of vulnerabilities in OPC UA, a widely used industrial communications protocol [Read More]
"Our society has not yet embraced cybersecurity as a civilization-defining competency, yet it is exactly central to our capacity to function in this massively technological age," ProtectWise CTO Gene Stevens told SecurityWeek. [Read More]
A report from the Senate Intelligence Committee says Russian hackers attempted to undermine confidence in the voting process in the 2016 election, but there is no evidence that they manipulated votes or modified voter registration data [Read More]
SafeBreach raises $15 million in Series B funding round, bringing the total raised by the company so far to $34 million [Read More]
A malicious package masquerading as a cookie parsing library but delivering a backdoor instead was unpublished from the npm Registry along with three other packages [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Joshua Goldfarb's picture
We can all be more understanding of people when they do exactly what we incentivize them to do. To that point, I offer “10 security behaviors that anger us, but that we incentivize".
Marc Solomon's picture
It is important for threat intelligence analysts, SOCs and incident responders to work together to take the right actions faster, reducing the time to response and remediation.
Ashley Arbuckle's picture
We have an opportunity to expand the pool of workers and improve security and financial performance in the process, with teams that are based on inclusion and diversity.
Bradon Rogers's picture
While a contract, distributed, partner-oriented workforce and supply chain can create serious risks to your organization, careful implementation of visibility and data protection strategies can help you mitigate many of the risks.
Josh Lefkowitz's picture
Before finalizing a vendor relationship, it’s crucial to construct a response plan in preparation for any future incidents the vendor might experience.
Rafal Los's picture
If you're not careful, security becomes a hinderance and a target. Where security leaders create inflexible environments, security tends to struggle.
Steven Grossman's picture
Without an understanding of where you stand today, new security tools will result in more redundancy and gaps in protection.
Marc Solomon's picture
The industry needs to share a common understanding of how to put threat intelligence into practice to address some of our thorniest security operations challenges.
Ashley Arbuckle's picture
Edna Conway, Cisco’s Chief Security Officer, Global Value Chain, discusses mitigating third-party security risk across an ecosystem that includes tens of thousands of partners located around the globe.
Jim Ivers's picture
More vulnerabilities create more attacks; more attacks breed additional fatigue. So how can we wake up and fix the problems creating such a widespread headache?