Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Windows, macOS, Edge, Safari, Flash Player and Firefox were hacked on the second day of the Pwn2Own 2017 competition [Read More]
Intel launches first bug bounty program with rewards of up to $30,000 for critical vulnerabilities in the company’s hardware [Read More]
On day one of Pwn2Own 2017, participants hacked Microsoft Edge, Safari, Ubuntu and Adobe Reader [Read More]
Turkish hackers abuse Twitter Counter app to hijack many high-profile Twitter accounts over the diplomatic dispute between Turkey and the Netherlands [Read More]
Join this webinar to learn how to measure your cyber risk and establish an effective security framework [Read More]
Home Depot has agreed to pay banks $25 million as part of a settlement over the 2014 data breach [Read More]
Financially motivated attackers have become just as sophisticated as state-sponsored actors, says FireEye in 2017 M-Trends report [Read More]
RCE vulnerability in Apache Struts 2 affects several VMware products, including vCenter, DaaS, vROps and Hyperic [Read More]
Researchers discovered several vulnerabilities in Double telepresence robots. Flaws patched with server-side fix [Read More]
Several Cisco products are exposed to attacks due to the Apache Struts 2 vulnerability that has been exploited in the wild [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Marc Solomon's picture
Companies can make their entire security infrastructure more effective by using this threat intelligence as the glue to integrate layers of point products within a defense-in-depth strategy.
Travis Greene's picture
If there are only five controls that a security organization can reasonably tackle this year, what should they be?
Torsten George's picture
Cyber security and cyber threats are most often confused with cyber risk, and often used interchangeably, but they are worlds apart.
Avi Chesla's picture
Security analysts are collecting all events, but are struggling to filter out non-relevant signals in an attempt to isolate the important events from the rest of the noise.
Jennifer Blatnik's picture
Every year, countless security vendors roam the show floor at RSA, promising that their latest revolutionary tool is going to solve the entire world’s security problems.
Scott Simkin's picture
While there were many amazing startups with great ideas at RSA this year, I fear they will struggle to convince new customers that “yet another dashboard” or source of threat analytics or intelligence is going to improve their cybersecurity posture.
Joshua Goldfarb's picture
Risk, reporting, and metrics are three important topics within information security, and they all mean drastically different things to different audiences.
Steven Grossman's picture
When it comes to security and cyber risk, CISOs are in the middle of it all, but they are not alone in protecting the enterprise.
Marc Solomon's picture
There are strategies you can use so that the risk score is more relevant and useful within your specific environment.
Torsten George's picture
Let’s consider whether the proposed principles and tools by the World Economic Forum (WEF) can improve cyber resilience, and which types of enterprises can benefit most from implementing them.