Security Experts:

Management & Strategy
long dotted


Apple this week announced that third-party cookies are now blocked by default in Safari on macOS, iOS and iPadOS. [Read More]
A global survey of 1,000 IT security professionals has revealed that over 70% would rather protect corporate networks than industrial organizations. [Read More]
Investors and industry professionals discuss the impact of the COVID-19 coronavirus pandemic on early-stage venture investment in cybersecurity. [Read More]
Hundreds of publicly available ICS hacking tools, many of which have been developed by researchers, lower the bar for threat actors looking to target OT networks, FireEye warns. [Read More]
GE says the personal information of some employees may have been compromised as a result of a data breach suffered by Canon Business Process Services. [Read More]
The home confinement of hundreds of millions of people worldwide to halt coronavirus contagion has presented intelligence services with a challenge: monitoring an explosion in internet traffic, above board and not, even as their own capacity is reduced. [Read More]
New Mexico school districts, universities, and government agencies have collectively spent millions of dollars to regain control of their computer systems after being hit by ransomware. [Read More]
Mozilla is getting ready to remove support for FTP in the Firefox browser due to security concerns. [Read More]
UK financial technology company Finastra has disclosed a data breach that may involve ransomware. [Read More]
Pwn2Own 2020 day 2: participants earned $40,000 for an Oracle VirtualBox exploit and $50,000 for a system takeover exploit involving Adobe Reader and Windows vulnerabilities. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Marc Solomon's picture
It’s up to humans, guided by instinct, intelligence and experience, to determine the right data, so they can focus on what matters to the organization, make better decisions and take the right actions.
Laurence Pitt's picture
We’ve seen a shift away from ‘common themes’ across the RSA Conference to real development in plenty of new areas that truly advance cybersecurity.
Joshua Goldfarb's picture
How many times have you met someone full of promises and big on talk, only to be disappointed by what results from your engagement with them.
Marc Solomon's picture
When you’re at RSAC next week remember the “Human Element” is a great lens through which you can view and help assess the value of companies you partner with for security.
Laurence Pitt's picture
What can we do in order to prevent the spread of fake content or reduce the risk of a targeted use of Deepfakes that could cause damage to our organization?
Joshua Goldfarb's picture
Gap analysis can serve as a wonderful driver for improving security metrics if the security team understands how to seize the opportunity it presents.
Gunter Ollmann's picture
While defense scoring lowers the barrier to sharing defensive success insights, it does not yet address the insights gained from learning from others’ failures and the stigma of a breach.
AJ Nash's picture
Elevating from the Cyber threat intelligence (CTI) team concept to an “intelligence team” concept is the next generation of intelligence practice within the private sector.
Marc Solomon's picture
Threat intelligence value comes down to relevance and accessibility, which requires curation into a customized enrichment source, aggregating data filtered by a range of factors.
Craig Harber's picture
No matter how many best-of-breed protective solutions you use to defend your network, the unfortunate reality is eventually an attacker is going to get past them.