Security Experts:

Management & Strategy
long dotted


Respond Software emerges from stealth with product that automates the decision-making of a SOC analyst and $12 million in funding [Read More]
Amazon launches Macie, a new service that helps AWS users discover, classify and protect sensitive data [Read More]
Hackers possibly from China planted a backdoor in popular connectivity tools from NetSarang as part of a major supply chain attack [Read More]
Public cloud environments are the most secure, according to data collected over an 18-month period by Alert Logic [Read More]
Webroot buys security awareness training company Securecast to offer a security awareness platform to MSPs [Read More]
VMware patches hard-to-exploit DoS vulnerability in the NSX-V network virtualization solution [Read More]
Russia-linked cyberspy group APT28 targets hotels in Europe and their main target may be government and business travelers [Read More]
Version control systems Git, Subversion, Mercurial and CVS affected by command execution vulnerability [Read More]
Complete "breach intolerance" is an aspiration not currently achieved by today's security operations centers (SOCs), according to a recent survey. [Read More]
An unnamed company is offering up to $250,000 for virtual machine (VM) hacks as part of a secret bug bounty program [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Preston Hogue's picture
Business leaders have become much more sophisticated in understanding IT, and they need bring that same level of sophistication to security.
Travis Greene's picture
Automation will play an ever-increasing role in IT security. Like all automation, it will result in greater productivity that will reduce the need for certain staff, but increase the need for others.
Ashley Arbuckle's picture
As with most new and challenging endeavors, you need to define a pragmatic approach to mastering hyper-connectivity, data integration, and machine learning.
Marc Solomon's picture
Automatically recalculating and reevaluating priorities and threat assessments ensures you continue to stay focused on what is relevant to mitigate your organization’s risk.
Marie Hattar's picture
Companies often neglect the security implications of mergers and acquisitions. After all, each company had theoretically been secure and in compliance before the merger. Why would the combined entity be any different?
Amy Blackshaw's picture
No matter how many people are on a security operations team, they must be empowered with tools that help uncover the threats that matter most.
Josh Lefkowitz's picture
The Deep & Dark Web remains most familiar to cybersecurity and IT teams, but such intelligence can also benefit the mergers and acquisitions (M&A) due diligence process.
Adam Meyer's picture
By including digital risk monitoring as part of your threat intelligence capability, you can better understand your most critical areas of risk and the possible avenues of approach for adversaries.
Joshua Goldfarb's picture
What are security buyers looking for, and how can sellers understand what buyers are looking for to determine whether or not their offering is a good fit?
Travis Greene's picture
While it’s easy to rely on metrics that are readily available, how does one determine which metrics are actually a measure of security success as it pertains to the overall business priorities?