Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Google says roughly two-thirds of the websites loaded through Chrome use HTTPS by default [Read More]
Amazon-owned Whole Foods Market said the recent payment card breach impacted nearly 100 locations across the U.S. [Read More]
U.S. Federal Energy Regulatory Commission (FERC) proposes new cyber security management controls to enhance power grid reliability and resilience [Read More]
Contracting giant Booz Allen is to acquire cybersecurity firm Morphick, a move that will help Booz Allen to move further along its published plan to expand its commercial presence. [Read More]
Visa launches ID Intelligence, a new platform that allows card issuers, acquirers and merchants to adopt new biometric methods of their own preference [Read More]
Google prompt has now become the primary choice for 2-Step Verification (2SV), instead of SMS [Read More]
A new, massive Mirai-linked botnet is recruiting improperly secured IoT devices such as IP wireless cameras [Read More]
Canada’s CSE spy agency releases the source code of a malware detection and analysis tool named Assemblyline [Read More]
Google is offering a bonus of $1,000 to researchers who find serious vulnerabilities in select Android apps present on Google Play [Read More]
BoundHook hooking method is invisible to Windows 10’s PatchGuard. The issue is not considered a vulnerability by Microsoft [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Josh Lefkowitz's picture
When key decision-makers broaden their mindsets and strategies pertaining to the value and function of intelligence, their organizations can become better positioned to mitigate the cyber and physical risks they face.
Adam Meyer's picture
Threat intelligence playbooks that support strategic and operational levels help teams be more effective, more certain in their actions and allow security programs to be agile/maintained as situations change.
Alastair Paterson's picture
The Equifax breach has had a damaging impact on the company and has put its customers at risk. But it has also served as a wake-up call for organizations around the globe.
Rafal Los's picture
With the many strategy development workshops in which I’ve successfully engaged, it’s hard to believe how many companies struggle with stakeholders as a starting point.
Justin Fier's picture
When third-parties are integrated onto the network, threats are bound to slip through the cracks, and the Equifax hack demonstrated how easy it is for a subtle threat to develop into a debilitating data breach.
Travis Greene's picture
If awareness isn’t working to change the behavior of employees and consumers, is there anything that can be done?
Preston Hogue's picture
As security professionals, it’s on us to understand the business implications of those conveniences and the impact they may have.
Joshua Goldfarb's picture
A seat at the security table should not be for only the elite and largest of businesses or security vendors. The time has come to democratize security.
Josh Lefkowitz's picture
Business Risk Intelligence (BRI) can help inform their decisions, gain a decision advantage over adversaries, and mitigate a broad spectrum of cyber and physical risks.
Lance Cottrell's picture
While mergers and acquisitions (M&A) are generally known for bringing economic growth and opportunity, people are beginning to realize that the process also brings serious cybersecurity risks.