Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Canada's spy agencies are divided over whether or not to ban Chinese technology giant Huawei from fifth generation (5G) networks over security concerns. [Read More]
Threat statistics come from a variety of sources: reported incidents, vendor telemetry, internet traffic and dark web analysis. All have value, and all have limitations. [Read More]
Google on Tuesday defended a project aimed at modernizing healthcare while giving it access to medical data of millions of people. [Read More]
Enterprise information management firm OpenText to acquire data protection and cybersecurity provider Carbonite in a $1.42 billion deal. [Read More]
ASP.NET hosting provider SmarterASP.NET is currently working on recovering customer data after being hit by a ransomware attack over the weekend. [Read More]
Check Point’s ZoneAlarm forum has been breached and the details of thousands of users have been leaked. [Read More]
Crowdsourced security platform Bugcrowd paid over half a million dollars in bug bounty rewards during the last week of October alone. [Read More]
Swiss insurance company Zurich announces new cyber coverages for the manufacturing industry. [Read More]
Consulting giant Accenture launches three cyber ranges designed to help industrial companies practice their cyberattack response plan. [Read More]
Whistleblowers and digital pioneers have long been sounding the alarm about abuses of our privacy online, and tech entrepreneurs are bidding to turn growing consciousness about the problem into a money-making industry. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Joshua Goldfarb's picture
When the security of our organization depends on us leaving our comfort zone, how can we ensure that we accomplish what we set out to do without putting the organization at additional risk?
Marc Solomon's picture
As the holiday approaches, I thought I’d take the opportunity to share three things I believe every security professional can give thanks for.
Josh Lefkowitz's picture
It’s crucial to recognize that annual security predictions generally only include that which can be feasibly predicted by the final months of the prior year.
Marie Hattar's picture
The solution: every week, devote at least two hours to basic cyber hygiene. Four best practices will help your team build habit from repetition.
Joshua Goldfarb's picture
Security metrics is a topic that, while challenging, is also important and at the top of the priority list for security organizations. Here are five tips for leveraging security metrics to keep your organization out of the lion’s den.
Craig Harber's picture
As long as organizations continue to employ simplistic “set it and forget it” security approaches, they will be forced into playing reactive, catch-up defense against cyber attackers.
Fred Kneip's picture
Employing a third party adds risk, especially if that company is given some level of access to network and computing resources, or is asked to handle and protect critical or proprietary information.
Marc Solomon's picture
National Cybersecurity Awareness Month (NCSAM) is a great vehicle to raise awareness for cybersecurity and to remind every organization that the ability to improve security operations begins with contextual awareness.
Josh Lefkowitz's picture
Here’s a crash-course on the intelligence cycle and how you can apply and derive value from its core principles—no matter your role or security discipline:
Joshua Goldfarb's picture
The time to get serious about metrics is long overdue. It is in this spirit that I offer five helpful tips for building meaningful security metrics.