Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Health insurer Anthem Inc. has agreed to pay the government a record $16 million to settle potential privacy violations in the biggest known health care hack in U.S. history, officials said. [Read More]
The DHS ordered federal agencies to fully implement DMARC by October 16, 2018. While there has been significant progress, many agencies failed to meet the deadline [Read More]
All major web browsers will deprecate support for the older Transport Layer Security (TLS) 1.0 and 1.1 protocols in the first half of 2020 [Read More]
IBM Security Connect is a new cloud platform that brings together data, applications and tools from over a dozen vendors [Read More]
Apple, Cisco, Mozilla, Kaspersky and others are concerned about Australia's encryption laws, despite the government specifically claiming it will not weaken encryption [Read More]
Could hackers have been able to see the last person you cyberstalked, or that party photo you were tagged in? According to Facebook, the unfortunate answer is "yes." [Read More]
The Pentagon said there has been a cyber breach of Defense Department travel records that compromised the personal information and credit card data of U.S. military and civilian personnel. [Read More]
Facebook said that hackers accessed personal data of 29 million users in a breach at the world's leading social network disclosed late last month. [Read More]
A group of United States senators sent a letter to Google, urging it to provide an internal memo that supposedly explains why the company did not disclose the Google+ data exposure that was discovered in March. [Read More]
Industry professionals comment on recent Google+ security incident involving a bug that exposed personal information from 500,000 accounts [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Mike Fleck's picture
Enterprises need proactive and automated checks and balances on cloud access management and information sharing.
Josh Lefkowitz's picture
Evaluating a threat intelligence vendor’s collection strategy effectively is a complex process that requires far more than simply obtaining the answers to the questions outlined above.
Stan Engelbrecht's picture
These seven processes should be automated in order to save valuable time during incident response and security investigation procedures, and help organizations improve their overall cybersecurity posture.
Alastair Paterson's picture
Encouraging and supporting diversity and inclusion in the workforce will allow us to overcome the cybersecurity workforce gap now estimated to reach 1.8 million by 2022.
Preston Hogue's picture
Technical hacks to gain entry into sensitive systems are still an important part of the equation, but today they are just one tool in a much larger toolkit.
Ashley Arbuckle's picture
Customer Experience (CX) is becoming a key driver of success in the security industry, not just for companies that deliver superior customer experiences but – more importantly – for the organizations and security professionals they serve.
Marc Solomon's picture
Collaboration holds the key to improved time to detection and response, so teams can better address the concerns that permeate the organization when a large-scale attack happens.
Joshua Goldfarb's picture
What does letting go of the familiar have to do with security and what can we learn from it? I’d argue quite a bit.
Justin Fier's picture
Over time, holding people responsible will lead individuals to see how their actions impact the security of the organization and come to consider themselves responsible for the security of the company.
Josh Lefkowitz's picture
It is important to understand how the right intelligence can support network defense teams, fraud, physical security, M&A, insider threat, supply chain, and brand reputation teams, among others.