Security Experts:

Management & Strategy
long dotted


Pwn2Own Miami: Researchers earn $280,000 for hacking industrial control systems (ICS) and associated protocols. [Read More]
Paying off hackers after a ransomware infection could end up being a total loss, according to a study released Thursday which finds some attackers just take the money and run. [Read More]
Data security startup Privafy has emerged from stealth mode with $22 million in funding, which it will use to scale product development. [Read More]
Mastercard's new cyber center in Vancouver is sited at the refurbished Old Stock Exchange Building, where Mastercard subsidiary NuData is also located. [Read More]
The United States pressed France on Wednesday to take "strong security measures" against potential breaches from 5G services provided by Chinese telecommunications firm Huawei, saying failure to do so could imperil intelligence exchanges. [Read More]
Jan. 22, 2020 is the deadline to seek cash payments and claim free services as part of Equifax's $700 million settlement over a massive data breach. [Read More]
Cyber insurance provider Coalition has acquired BinaryEdge and it will integrate BinaryEdge technology into its cyber insurance and security platform. [Read More]
Cyber threat detection company Intezer this week announced it has raised $15 million in a Series B funding round. [Read More]
The World Economic Forum's Global Risks Report 2020 highlights the irony of the unfolding benefits of the Fourth Industrial Revolution, but brings with it counterbalancing increased cyber risk. [Read More]
Secure DevOps company Sysdig has raised $70 million in a Series E funding round, which brings the total raised by the company to over $200 million. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

AJ Nash's picture
Once we shed the shackles of “cyber” and “threat,” we free our teams to consider a full spectrum of intelligence, including support to physical security, insider threats, procurement, mergers and acquisitions, and executive decision-making.
Marc Solomon's picture
As a security professional you have several corrective measures available so you can efficiently and effectively make sense of massive volumes of data, understand what to work on next and know the right actions to take.
Fred Kneip's picture
While some forward-thinking companies have created c-suite positions for IT and security personnel such as CTOs and CISOs, these are, overall, still relatively rare.
Marc Solomon's picture
Security teams need the ability to understand threats, hunt for threats and use automation effectively and responsibly.
Joshua Goldfarb's picture
Josh Goldfarb presents the top ten New Year’s security resolutions that we should make and keep in 2020.
Josh Lefkowitz's picture
Choosing which vendor to partner with can be exceptionally difficult for MSSPs due to the oversaturation and complexity of the threat intelligence market.
Joshua Goldfarb's picture
Change may not always be on the docket, but when it is, how can we embrace it, understand it, and work to create a constructive environment around it?
Josh Lefkowitz's picture
The successful execution of each step of the intelligence cycle relies on the successful execution of the step that came before it.
Fred Kneip's picture
Third party cyber risk management programs need to go beyond an initial scan and evaluate your third party’s security from the inside out.
Joshua Goldfarb's picture
When the security of our organization depends on us leaving our comfort zone, how can we ensure that we accomplish what we set out to do without putting the organization at additional risk?