Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

Apple has acquired Fleetsmith, a company that specializes in solutions that automate the setup, patching and security of Macs, iPhones, iPads and Apple TV devices. [Read More]
Akamai has mitigated a second record-setting DDoS attack since the beginning of June, one that peaked at 809 MPPS. [Read More]
Sony this week announced the launch of a public PlayStation bug bounty program with rewards of over $50,000 for critical vulnerabilities. [Read More]
Hackers are confident that they will outperform AI for the next 10 years when it comes to finding vulnerabilities, Bugcrowd study shows. [Read More]
Republican senators have introduced what they have described as a “balanced” bill that would require tech companies to give law enforcement access to encrypted data. [Read More]
Companies believe strong authentication is important, but they still over-rely on passwords and allow their employees to access corporate resources via social media credentials. [Read More]
Twitter has suspended the account of Distributed Denial of Secrets after it posted links to information on 200 law enforcement organizations. [Read More]
A top German court has ordered Facebook to stop merging data collected through its Whatsapp and Instagram subsidiaries or other websites unless users explicitly agree, in a legal victory for competition authorities. [Read More]
Microsoft president Brad Smith on Tuesday said Europe was the global leader on setting rules for big tech, two years after the EU implemented the GDPR, its landmark data privacy law. [Read More]
Twitter has informed business users that their billing information may have been exposed through their web browser’s cache. [Read More]

FEATURES, INSIGHTS // Management & Strategy

rss icon

Laurence Pitt's picture
What can we do in order to prevent the spread of fake content or reduce the risk of a targeted use of Deepfakes that could cause damage to our organization?
Joshua Goldfarb's picture
Gap analysis can serve as a wonderful driver for improving security metrics if the security team understands how to seize the opportunity it presents.
Gunter Ollmann's picture
While defense scoring lowers the barrier to sharing defensive success insights, it does not yet address the insights gained from learning from others’ failures and the stigma of a breach.
AJ Nash's picture
Elevating from the Cyber threat intelligence (CTI) team concept to an “intelligence team” concept is the next generation of intelligence practice within the private sector.
Marc Solomon's picture
Threat intelligence value comes down to relevance and accessibility, which requires curation into a customized enrichment source, aggregating data filtered by a range of factors.
Craig Harber's picture
No matter how many best-of-breed protective solutions you use to defend your network, the unfortunate reality is eventually an attacker is going to get past them.
AJ Nash's picture
Once we shed the shackles of “cyber” and “threat,” we free our teams to consider a full spectrum of intelligence, including support to physical security, insider threats, procurement, mergers and acquisitions, and executive decision-making.
Marc Solomon's picture
As a security professional you have several corrective measures available so you can efficiently and effectively make sense of massive volumes of data, understand what to work on next and know the right actions to take.
Fred Kneip's picture
While some forward-thinking companies have created c-suite positions for IT and security personnel such as CTOs and CISOs, these are, overall, still relatively rare.
Marc Solomon's picture
Security teams need the ability to understand threats, hunt for threats and use automation effectively and responsibly.