Security Experts:

Management & Strategy
long dotted


DARPA is seeking proposals for hardware architectures that will disarm many of today’s software attacks [Read More]
Microsoft addresses more than 40 vulnerabilities, including three zero-days exploited in attacks [Read More]
OWASP has proposed two new vulnerability categories for the 2017 update of the OWASP Top 10 [Read More]
Video gaming retail company Gamestop appears to have been breached, with an unknown number of customers' payment card details stolen. [Read More]
British payday loan company Wonga suffers data breach. The incident could affect up to 270,000 current and former customers [Read More]
The Shadow Brokers have released more NSA exploits, along with a message to US President Donald Trump [Read More]
Hundreds of thousands of IIoT and ICS products could be exposed to attacks due to critical vulnerabilities affecting a widely used CODESYS framework [Read More]
WikiLeaks publishes documents detailing Grasshopper, a platform used by CIA to create Windows malware installers [Read More]
Modbus-related Implementation flaws allow attackers to execute arbitrary commands on controllers from several vendors [Read More]
Honeywell has launched a new product designed to protect industrial facilities from USB-borne threats [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Steven Grossman's picture
With the right cyber hygiene up front in addition to tools and processes utilized on an ongoing basis, the impact of insider threats can be greatly reduced and mitigated.
Rafal Los's picture
If enterprise information security is to make stride in a positive direction we need less of the self-aggrandizing “expert” and more of those who can aggregate and distill tribal knowledge into wisdom.
Josh Lefkowitz's picture
Executive protection and physical security teams must leverage cyber threat intelligence to gain visibility into all relevant cyber and physical threats and ensure open collaboration and information sharing with all business functions.
Erin O’Malley's picture
In cybersecurity, basic hygiene is a must. You could implement every eye-catching security tool on the market, but without good, clean hygiene and the ability to deliver tools the right data at the right time, they’ll never shine their brightest.
Jennifer Blatnik's picture
If CISOs took a page from physicians and worked together to share missteps and move forward, they could gain crucial security learnings and prevent the spread of attacks.
Marc Solomon's picture
Companies can make their entire security infrastructure more effective by using this threat intelligence as the glue to integrate layers of point products within a defense-in-depth strategy.
Travis Greene's picture
If there are only five controls that a security organization can reasonably tackle this year, what should they be?
Torsten George's picture
Cyber security and cyber threats are most often confused with cyber risk, and often used interchangeably, but they are worlds apart.
Avi Chesla's picture
Security analysts are collecting all events, but are struggling to filter out non-relevant signals in an attempt to isolate the important events from the rest of the noise.
Jennifer Blatnik's picture
Every year, countless security vendors roam the show floor at RSA, promising that their latest revolutionary tool is going to solve the entire world’s security problems.