Leadership and Management

Leadership and management news, analysis, research, how-to, opinion, and video.

Mike McConnell
taiwan earthquake

0 intro love

What to love about your IT security job

Security practices may not top the “what I love about my job” list for the everyday employee, but for those working in the InfoSec industry, it’s a different story.

Jason Hoffman 620x465

Jason Hoffman joins Marketo as company's first CSO

The marketing automation company has centralized leadership around security and risk management into one organization, led by Hoffman.

audit checklist review

What every IT department needs to know about IT audits

Today's IT departments are faced with deadlines to deploy and fix an ever increasing array of advanced technology. All of this while trying to maintain some sort of security and compliance posture. Add to this budget cuts and staff...

waiting in line

To queue or not to queue, that is the PCI question

In the first of this three-part series, David Mundhenk and I will detail issues surrounding message queuing and how to ensure it doesn’t break your PCI DSS compliance effort.

scales of justice

SpyHunter anti-malware maker files lawsuit over bad review

Bleeping Computer, one of the Web's largest self-help portals for computer problems, has been sued by Enigma Software Group after posting a bad review of their core product SpyHunter. The lawsuit was filed on January 8, but the review...

Bug bounty

Risk vs reward: how to talk about bug bounty programs

Casey Ellis, co-founder and CEO of Bugcrowd Inc., offers some advice for security newbs on how to broach the topic of bug bounty programs.

gavel court trial

Security negligence goes to court

The number of people whose data was breached in 2015 exceeded that of the previous year. How do we plan to regulate these cases? What should organizations be compelled to do in order to protect the sensitive information they store?...


The struggle to create fusion energy at MIT

MIT's Dennis Whyte talks about the efforts to build a prototype fusion reactor.


The MIT C-MOD Fusion Reactor Project

MIT has been developing a small fusion reactor prototype, three of which could power the City of Boston if they were fully built.

fireeye logo

FireEye acquires Invotas; Who's next?

FireEye adds security orchestration and automation to their global threat intelligence platform.


The findings on how consumers actually behave after breaches

Dr. Branden Williams shares the data from his recent research on how consumers actually behave after breaches and what it means for security leaders

police lineup identification

Does attribution matter to security leaders?

Levi Gundert shares his experience on when, how, and why attribution matters for security leaders

benjamin netanyahu cybertech2016

Live from Tel Aviv, it’s CyberTech

I attended the Cybertech Conference & Exhibition in Tel Aviv. Now that I have caught my breath, here’s my account.

security hole in fence clouds gap opening

How to be or find a skilled pen tester

Pen testers are and will continue to be in high demand.

iranian flags

Norse Corp: Deconstructing threat intelligence on Iran

A report written by Norse Corp in 2015, circulated privately among the company's government contacts, has reopened the debate about threat intelligence and the vendors that promote it.

shield piggy bank savings money invest

Five rules to conduct a successful cybersecurity RFP

It’s too early to speak about a cybersecurity bubble, however, it becomes more and more difficult to distinguish genuine security companies, with solid in-house technologies, and experts with flashy marketing and FUD (Fear,...


Space laser communications satellite launches

The first node of the European Data Relay System is in orbit, promising much faster relay of important scientific data

bigdata problem thinkstock

5 reasons you need to hire a Chief Privacy Officer

Businesses are increasingly relying on data, but they're overlooking another key aspect of data: privacy. In order to keep up with the growing regulations surrounding data privacy, it may be time to hire a Chief Privacy Officer.

Load More