Leadership and Management

Leadership and management news, analysis, research, how-to, opinion, and video.

correspondence
colorful book

07 budget

How to convince the CFO of the budgetary security need

It had been custom for organizations to think of cyber security in terms of an information technology (IT) problem best left to IT people to address and fix. However, as more prolific breaches were publicized exposing a variety of...

rtx23m0e

Job hunting? White House seeking a CISO

I cannot help but to think of some memes at times. The one that has gotten lodged there today is the late Robin Williams with a great big bushy beard screaming “What year is it?”. News came out today that, at long last, the White...

improve security primary

What do we need to improve security?

Keith Lowry from Nuix shares his experience and insights on what we need to do to reshape and reprioritize information security practices

Mike McConnell

Former NSA director Mike McConnell joins Securonix board

Security intelligence platform provider Securonix announced that Vice Admiral (Ret.) Mike McConnell, former U.S. Director of National Intelligence, has joined the company as senior advisory board member.

taiwan earthquake

Strong Taiwan quake appears to have little effect on chip industry

An earthquake measuring 6.4 on the Richter scale struck close to a major chip manufacturing hub in Tainan, Taiwan on Saturday morning local time. Some damage was reported to TSMC, a major chip manufacturer.

0 intro love

What to love about your IT security job

Security practices may not top the “what I love about my job” list for the everyday employee, but for those working in the InfoSec industry, it’s a different story.

Jason Hoffman 620x465

Jason Hoffman joins Marketo as company's first CSO

The marketing automation company has centralized leadership around security and risk management into one organization, led by Hoffman.

audit checklist review

What every IT department needs to know about IT audits

Today's IT departments are faced with deadlines to deploy and fix an ever increasing array of advanced technology. All of this while trying to maintain some sort of security and compliance posture. Add to this budget cuts and staff...

waiting in line

To queue or not to queue, that is the PCI question

In the first of this three-part series, David Mundhenk and I will detail issues surrounding message queuing and how to ensure it doesn’t break your PCI DSS compliance effort.

scales of justice

SpyHunter anti-malware maker files lawsuit over bad review

Bleeping Computer, one of the Web's largest self-help portals for computer problems, has been sued by Enigma Software Group after posting a bad review of their core product SpyHunter. The lawsuit was filed on January 8, but the review...

Bug bounty

Risk vs reward: how to talk about bug bounty programs

Casey Ellis, co-founder and CEO of Bugcrowd Inc., offers some advice for security newbs on how to broach the topic of bug bounty programs.

gavel court trial

Security negligence goes to court

The number of people whose data was breached in 2015 exceeded that of the previous year. How do we plan to regulate these cases? What should organizations be compelled to do in order to protect the sensitive information they store?...

video

The struggle to create fusion energy at MIT

MIT's Dennis Whyte talks about the efforts to build a prototype fusion reactor.

video

The MIT C-MOD Fusion Reactor Project

MIT has been developing a small fusion reactor prototype, three of which could power the City of Boston if they were fully built.

fireeye logo

FireEye acquires Invotas; Who's next?

FireEye adds security orchestration and automation to their global threat intelligence platform.

consumerbreachchart5

The findings on how consumers actually behave after breaches

Dr. Branden Williams shares the data from his recent research on how consumers actually behave after breaches and what it means for security leaders

police lineup identification

Does attribution matter to security leaders?

Levi Gundert shares his experience on when, how, and why attribution matters for security leaders

benjamin netanyahu cybertech2016

Live from Tel Aviv, it’s CyberTech

I attended the Cybertech Conference & Exhibition in Tel Aviv. Now that I have caught my breath, here’s my account.

Load More