Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

GitHub announced that its token scanning service now also checks commits for accidentally shared Atlassian, Dropbox, Discord, Proctorio and Pulumi tokens. [Read More]
Facebook announces that its Data Abuse Bounty program now includes Instagram, and the company has invited some security researchers to test Instagram’s new Checkout feature. [Read More]
AWS has reached out to customers reportedly targeted by the Capital One hacker, but says none of them reported any significant issues. [Read More]
A ransomware attack hit 23 local government entities in Texas last week, the Texas Department of Information Resources (DIR) has revealed. [Read More]
Iowa grocery chain Hy-Vee is warning customers about a security incident involving some of its payment card systems. [Read More]
Apple files copyright infringement lawsuit against Corellium for creating replicas of iOS that can be used as a security research tool for discovering vulnerabilities. [Read More]
A survey of over 2,000 Americans shows that cybersecurity has become a political issue and most believe that cybersecurity should be a top priority for the government. [Read More]
ESET has partnered with Myers-Briggs to examine the relationship between staff personality traits (their MBTI) and cyber behaviors. [Read More]
The FBI is looking for outside contractors to monitor social media for potential threats, setting up a possible conflict with Facebook and other companies over privacy. [Read More]
McAfee acquires NanoSec to strengthen the container security capabilities of its MVISION Cloud and MVISION Server Protection products. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Stan Engelbrecht's picture
What does the cyber kill chain have to do with Sherlock Holmes, and this quote in particular?
Ashley Arbuckle's picture
While we can’t turn our attention away from gathering data, we must devise new ways to deal with the onslaught of data. Humans simply can’t keep up, and the problem is getting worse.
Marc Solomon's picture
The security market has become confusing and it is not about the product or technology to be used; it is about solving a specific problem.
Josh Lefkowitz's picture
Many businesses either don’t have a risk appetite statement, or they have one that was developed without input and guidance on cyber risk from the CISO.
Torsten George's picture
A gradual improvement in cyber hygiene can go a long way toward keeping an organization immune from security infections and minimizing the risk of falling victim to a cyber-attack.
Laurence Pitt's picture
Creating and maintaining a successful security strategy is not a simple task, but with the right sponsorship and external resources, it does not have to be a negative experience.
Joshua Goldfarb's picture
Josh Goldfarb discusses some of the connections between the information security profession and the magical days of summer vacation.
Marc Solomon's picture
Security teams have more internal system data than they know what to do with from sources including the SIEM system, log management repository, case management systems and security infrastructure. Security analysts struggle to make sense of too much data.
Josh Lefkowitz's picture
Request for intelligence (RFI) services have quickly become both ubiquitous and prone to misleading claims in the threat intelligence market.
Stan Engelbrecht's picture
Security teams need to incorporate intent-based response, behavior-based detection, and a kill chain perspective to get a step ahead of their adversaries.