Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Equifax advised victims of the recent breach on Twitter to access a fake support website instead of equifaxsecurity2017.com [Read More]
The United States Securities and Exchange Commission (SEC) said a cyber-attack in 2016 may have allowed hackers to profit through trading on non-public information in its EDGAR filing system. [Read More]
FedEx estimates that the recent NotPetya malware attack had an impact of $300 million on the company’s earnings in the latest quarter [Read More]
Unprotected AWS cloud storage bucket leaks internal access credentials and other critical data from Viacom [Read More]
Researchers demo aIR-Jumper, a malware that uses infrared (IR) cameras to open a two-way communication channel to air-gapped networks [Read More]
Threat Stack, a Boston based intrusion detection startup, has raised $45 million in a Series C funding, bringing the total raised by the company to more than $70 million. [Read More]
Optionsbleed - Apache leaks server memory via the “Allow” header in response to HTTP OPTIONS requests [Read More]
The recent Equifax breach affects roughly 100,000 Canadian consumers, but the company’s Canada systems are not impacted [Read More]
Siemens and PAS announce strategic partnership to provide cybersecurity solutions for industrial control systems (ICS) [Read More]
Google and Spotify announce Forseti, a community-driven collection of open source security tools for Google Cloud Platform (GCP) environments [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Marc Solomon's picture
With the sheer volume of threat data continuing to climb at a staggering rate, security teams need to start with the threat – automating how we gather, score and prioritize threat intelligence.
Ashley Arbuckle's picture
MSSPs help alleviate the complexity of maintaining and managing a proliferation of security products and point solutions in order to get their full value.
Joshua Goldfarb's picture
Benchmarking is about understanding how people use a variety of different products and services, what challenges they use them to address, and how those products and services fit into the organization’s security strategy.
Josh Lefkowitz's picture
Regardless of the extent to which your organization shares information, there’s a lot we can all learn from the WireX botnet takedown.
Rafal Los's picture
Rather than starting with a sound, business-aligned strategy supported by business-executive stakeholders there are far too many security organizations that just choose the “do something” path.
Adam Meyer's picture
Want to hire the best analyst? Then first define what is usable and then focus your search on those characteristics.
Alastair Paterson's picture
With greater awareness about POS system attacks, operations against third-party suppliers, and the vulnerabilities of public or semi-public Wi-Fi networks, companies can do a lot to mitigate risk and ensure safer journeys for travelers.
Travis Greene's picture
Operating with the assumption that you’ve already been hacked makes security incident response planning a priority for the organization.
Steven Grossman's picture
Why do we seem to need layer upon layer of regulation and guidance to try to ensure a more secure business world? Is it working?
Marc Solomon's picture
To more effectively prioritize to ensure relevance of threat intelligence, humans must be involved. After all, who understands your environment better than you?