Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

CrowdStrike and Dragos form strategic partnership to provide comprehensive ICS / SCADA security services. [Read More]
A security audit of Firefox Accounts revealed a total of 15 issues, including flaws rated critical and high severity [Read More]
A vulnerability dubbed by researchers Devil’s Ivy could affect millions of security cameras and other IoT devices [Read More]
Rapid7 announced that it has acquired security orchestration and automation firm Komand for an undisclosed sum. [Read More]
Dow Jones has exposed the details of millions of customers via a misconfigured AWS S3 bucket [Read More]
Tens of thousands of Memcached servers are exposed to the Internet and vulnerable to attacks leveraging critical remote code execution flaws found last year [Read More]
Amendments to U.S. intelligence and defense policy bills include Russian and North Korean hacking, cybersecurity strategy, vulnerability disclosures, and information leaks [Read More]
Industry is massively underinsured against a major global cyberattack -- which could trigger losses on a par with natural disasters such as Hurricane (Superstorm) Sandy, according to a study conducted by Lloyds of London. [Read More]
Owner of cheating service Ashley Madison offers to pay $11.2 million to settle data breach lawsuits [Read More]
Over 750 domains hijacked and pointed to RIG exploit kit after attackers accessed a web portal belonging to a technical partner of French registrar Gandi [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Travis Greene's picture
While it’s easy to rely on metrics that are readily available, how does one determine which metrics are actually a measure of security success as it pertains to the overall business priorities?
Preston Hogue's picture
The problem with the CISO role today is that it holds a C-level title but may not always be at the C-level. So how does our CISO profession continue to evolve and gain that seat?
Ashley Arbuckle's picture
Many organizations are not achieving the full benefits of digital transformation because they lack a comprehensive security program.
Jennifer Blatnik's picture
Whether they come from a technical, business or even military background, all CISOs experience a number of personal and professional roadblocks on a daily basis that challenge the ultimate success of their company’s security.
Steven Grossman's picture
Planning for cyber protection and resiliency is a large topic that requires the right framework and a balance of strategic and tactical thinking.
Joshua Goldfarb's picture
Will your security team always see the security program like elementary school children see the water fountain -- just right or on the path to being just right?
Travis Greene's picture
As employees spend more time outside the office in the summer months, risk increases. Most of us bring our work, and the devices that we use to access it, with us wherever we go, including on our vacations.
Michael Moniz's picture
Your elite cyber defense team needs to actively communicate, pass the bits of evidence around, develop the big picture strategy and be able to adjust to different adversaries.
Adam Meyer's picture
With sound and timely operational threat intelligence, you can make life a lot harder for adversaries and have a much better understanding of how your organization is positioned against today's cyber threats.
Joshua Goldfarb's picture
All the activity around the WannaCry ransomware attack really did make me want to cry. But not for the reasons you might expect. So what was it that nearly brought me to tears?