Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Vulnerabilities found by researchers in the Segway miniPRO allow hackers to take control of the hoverboard and possibly cause injury to the rider [Read More]
CrowdStrike and Dragos form strategic partnership to provide comprehensive ICS / SCADA security services. [Read More]
A security audit of Firefox Accounts revealed a total of 15 issues, including flaws rated critical and high severity [Read More]
A vulnerability dubbed by researchers Devil’s Ivy could affect millions of security cameras and other IoT devices [Read More]
Rapid7 announced that it has acquired security orchestration and automation firm Komand for an undisclosed sum. [Read More]
Dow Jones has exposed the details of millions of customers via a misconfigured AWS S3 bucket [Read More]
Tens of thousands of Memcached servers are exposed to the Internet and vulnerable to attacks leveraging critical remote code execution flaws found last year [Read More]
Amendments to U.S. intelligence and defense policy bills include Russian and North Korean hacking, cybersecurity strategy, vulnerability disclosures, and information leaks [Read More]
Industry is massively underinsured against a major global cyberattack -- which could trigger losses on a par with natural disasters such as Hurricane (Superstorm) Sandy, according to a study conducted by Lloyds of London. [Read More]
Owner of cheating service Ashley Madison offers to pay $11.2 million to settle data breach lawsuits [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Joshua Goldfarb's picture
All the activity around the WannaCry ransomware attack really did make me want to cry. But not for the reasons you might expect. So what was it that nearly brought me to tears?
Steven Grossman's picture
A series of events converged during the past few weeks that reemphasized the need for our industry to do a better job of establishing measurable and repeatable processes.
Marc Solomon's picture
Threat intelligence integration done right will allow you to act on threat intelligence efficiently and effectively using your existing security tools and services.
Torsten George's picture
The healthcare industry has experienced an onslaught of cyber-attacks over the last year, primarily driven by the fact that patient records are highly prized assets among cyber criminals.
Rafal Los's picture
Don’t overlook the importance of having something that’s repeatable. To be repeatable, a process must be well-documented, well-understood and well-practiced.
Joshua Goldfarb's picture
How exactly does reviewing the different markets in the security space bring this famous quote from “Romeo and Juliet” to mind?
Oliver Rochford's picture
Einstein is often quoted as having said that insanity is doing the same thing again and again and expecting a different result. When it comes to cybersecurity, based on that definition, we must all be insane.
Michael Moniz's picture
To be an outstanding cybersecurity professional, you need to think outside of the box, be intellectually curious, self-sufficient and collaborative.
Adam Meyer's picture
Business executives can benefit from strategic threat intelligence by gaining critical insights and establishing meaningful cybersecurity benchmarks.
Danelle Au's picture
When a vendor comes in for a presentation and, after only a few minutes, claims to know precisely what your challenges are and how to solve them, that’s a major red flag for the confident CISO.