Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Clemson and other universities are working to improve cybersecurity. [Read More]
LaPorte County in Indiana paid a ransom of over $130,000 demanded by cybercriminals who managed to infect its systems with a piece of ransomware. [Read More]
Hackers can manipulate media files transferred by users via WhatsApp and Telegram due to the way Android allows apps to access files on a device’s external storage. [Read More]
Ransomware has been a thorny cybersecurity issue for several years, and experts debate weather. organizations should pay or not pay ransomware demands. [Read More]
The Forum of Incident Response and Security Teams (FIRST) announces CVSS v3.1, which aims to simplify and improve upon CVSS v3.0. [Read More]
United States Conference of Mayors, which represents over 1,400 mayors from cities with a population of at least 30,000, promises not to pay ransomware demands. [Read More]
Premera Blue Cross, the largest health insurer in the Pacific Northwest, has agreed to pay $10 million to 30 states following an investigation into a data breach that exposed confidential information on more than 10 million people across the country. [Read More]
Google contractors regularly listen to and review some recordings of what people say to artificial-intelligence system Google Assistant, via their phone or through smart speakers such as the Google Home. [Read More]
An Exploit Prevention update released recently by McAfee for Endpoint Security is blocking Windows users from logging on to their systems, and some major organizations appear to be affected. [Read More]
Hackers breached the archive server for the Pale Moon open source web browser and infected all .exe files with malware. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Jim Gordon's picture
Intel's Jim Gordon explains how he set an example as one of a small handful of “male majority” leaders to help advance Diversity and Inclusion (D&I) efforts.
Ashley Arbuckle's picture
Shifting to a proactive approach to incident response (IR) is critical but identifying partners who can provide the capabilities you need is a challenging task.
Marc Solomon's picture
We can make the Security Operations Center (SOC) a powerhouse by tearing down walls between the various security groups in an organization.
Joshua Goldfarb's picture
Wild salmon face predators, such as grizzly bears, bald eagles, and sport fishermen. And yet, through it all, they remain focused on returning “with uncanny precision to the natal river where they were born.”
Devon Kerr's picture
How healthcare organizations used a trail of digital evidence to identify the type of attack they were experiencing and developed a remediation strategy.
Alastair Paterson's picture
Diversity of thought fosters psychological safety, which is a shared belief among teams that they perceive they are safe to take risks, and is one of the core indicators of highly effective teams.
Jim Gordon's picture
While I have blogged pretty frequently in the past, this is my first official column for any sort of major publication, and I am grateful for the opportunity from SecurityWeek.
Marc Solomon's picture
Security teams should be able to detect threats faster and use that knowledge to pivot and accelerate parallel investigations that are separate but related.
Ashley Arbuckle's picture
The convergence of security products and services is a welcomed development and will lead to improved security.
Joshua Goldfarb's picture
Five examples of how insecurity can actually help bolster a security program by allowing an organization to continually learn and make changes, thus improving.