Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

The server distributing a version of PC utility CCleaner infected with malware might have been compromised in early July, Avast revealed. [Read More]
DigitalOcean warns users that 1-Click applications running MySQL share a default password. Other cloud providers also affected [Read More]
In response to the massive Equifax breach, New York Governor Andrew Cuomo announced plans to make credit reporting firms comply with the 23 NYCRR 500 cybersecurity regulations. [Read More]
Equifax’s cybersecurity failings, including ignored vulnerability reports and executive credentials up for sale on the dark web, revealed following the breach [Read More]
Security ratings firm BitSight has partnered with CyberGRX to offer 360-degree view of third-party cyber risk. [Read More]
Trend Micro patches several vulnerabilities, including ones rated critical and high severity, in Mobile Security for Enterprise [Read More]
Equifax shares more details about the breach and how it was discovered by the company [Read More]
Equifax announced that its company’s Chief Security Officer and Chief Information Officer and are retiring effective immediately. [Read More]
Google has decided that starting with Chrome 63 resources delivered over FTP will be labeled “not secure” [Read More]
While the data stolen in the Equifax hack might be up for sale, scammers have also set up websites offering the data [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Danelle Au's picture
How do you decide where to focus your security efforts to break the kill chain? Let’s take a look at three different approaches.
Justin Fier's picture
Facing up to the blinds spots of our networks will help us direct our strategies toward the automation and visibility that we desperately need to anticipate the onset of attackers, before they strike.
Joshua Goldfarb's picture
Security marketing seems to be stuck in a bit of a “spray and pray” rut. Perhaps the time has come for security vendors to rethink how they invest their marketing budgets?
Jack Danahy's picture
Jack Danahy, co-founder and CTO of Barkly, attempts to clarify what is and what is not machine learning in endpoint security
Rafal Los's picture
Optiv's Rafal Los shares some advice on how to build and cultivate relationships in infosec
Josh Lefkowitz's picture
Oil and gas is one of the critical infrastructure sectors that face greater risks and challenges when it comes to security
Preston Hogue's picture
Business leaders have become much more sophisticated in understanding IT, and they need bring that same level of sophistication to security.
Travis Greene's picture
Automation will play an ever-increasing role in IT security. Like all automation, it will result in greater productivity that will reduce the need for certain staff, but increase the need for others.
Ashley Arbuckle's picture
As with most new and challenging endeavors, you need to define a pragmatic approach to mastering hyper-connectivity, data integration, and machine learning.
Marc Solomon's picture
Automatically recalculating and reevaluating priorities and threat assessments ensures you continue to stay focused on what is relevant to mitigate your organization’s risk.