Is MDM your solution to GDPR? (Gartner Blog, Jul 11 2017)
There is much hype around the GDPR due to the fast approaching deadline of 25 May 2018. As a result organizations are looking for solutions, and many vendors have seen……

Cisco continues its network-based security strategy by moving to acquire Observable Networks (Network World Security, Jul 13 2017)
Over the past few years Cisco has changed the face of its security business. What was once a struggling concern is now the fastest-growing part of Cisco. How did the company do this? Part of the rebirth of Cisco security can be traced to a change in focus, away from point products to a more data-driven model……

Australia Considering New Law Weakening Encryption (Schneier on Security, Jul 17 2017)
News from Australia: Under the law, internet companies would have the same obligations telephone companies do to help law enforcement agencies, Prime Minister Malcolm Turnbull said. …

6 Reasons Israel Became A Cybersecurity Powerhouse Leading The $82 Billion Industry (Forbes, Jul 18 2017)
6 Reasons Israel Became A Cybersecurity Powerhouse Leading The $82 Billion IndustryForbes“Cyber is a great business. It’s growing geometrically because there is never a permanent solution, it’s a never-ending business,” said Benjamin Netanyahu, Israel’s Prime Minister, at Tel-Aviv University’s 7 Annual Cybersecurity Conference….

Four ways to use open data sources to find cybersecurity candidates (ITworld, Jul 18 2017)
“Our initial hypothesis around where the talent was turned out to be totally wrong,” Ton says. “Thank goodness we didn’t [move some operations there] because they didn’t have the talent that we were seeking.” …

The Cybersecurity Canon – How to Measure Anything: Finding the Value of ‘Intangibles’ in Business (Palo Alto Networks Blog, Jul 19 2017)
Hubbard explains two math tricks that, after reading, seem impossible to be true, but when used by a Bayesian proponents, greatly simplify measurement-taking for difficult problems: The Power of Small Samples: The Rule of Five and The Single Sample Majority Rule (i.e., The Urn of Mystery Rule): …

Are Bug Bounties a True Safe Harbor? (The State of Security, Jul 20 2017)
Security vulnerabilities are becoming the new oil, and the bug bounty economy is booming. As news of cyberattacks and data breaches continue to consume the press, never before has the market for vulnerabilities been so dynamic. …

Information Risk Management Tips from Industry Experts (AccessData Blog, Jul 19 2017)
As a former editor with Compliance Week, Kelly adeptly facilitated the discussion while panelists addressed pressing topics around risk:
– Defining information risk throughout the enterprise.
– Companies’ understanding of information risk.
– How to assign ownership of information risk.
– The technological changes making information risk complicated….

Microsoft’s secret weapon in ongoing struggle against Fancy Bear? Trademark law (Ars Technica, Jul 21 2017)
“The idea…to use various federal laws—including the Computer Fraud and Abuse Act (CFAA), the Electronic Communications Privacy Act (ECPA), and American trademark law—as a way to seize command-and-control domain names…”

Facebook Security Boss: Empathy, Inclusion Must Come to Security (Threatpost, Jul 26 2017)
At Black Hat, Facebook CSO Alex Stamos’ keynote message was one of bringing empathy and inclusion to security, and that it’s time to stop being insular….

Facebook Cyber Chief Calls Out Harassment Of Female Hackers (Forbes, Jul 26 2017)
Female hackers still facing various forms of harassment. Facebook’s security chief wants everyone to call it out and make cybersecurity inclusive….

#RSAC: Precision Cybersecurity Evolution Required to Defend Cyberspace (Infosecurity Magazine, Jul 26 2017)
Rohit Ghai, President at RSA Security, makes the case for moving away from prevention cybersecurity towards precision cybersecurity. …

SIEM, Detection & Response: Build or Buy? (Gartner Blog, Jul 27 2017)
“We are working to refresh some of our SIEM research and also on a new document about SaaS SIEM. This specific one has triggered some interesting conversations about who buy services and who buy products, and how that decision is usually made.”…

How to report cybersecurity strategies to senior leaders (FCW, Jul 27 2017)
“The survey results illustrate the need for federal security professionals to allay some of those concerns with better-engineered IT systems that could serve as models for other organizations looking to build cybersecurity into systems from their inception.”…

What is Security Incident Management? The Cybersecurity Incident Management Process, Examples, Best Practices, and More (Digital Guardian, Jul 27 2017)
Learn about the security incident management process in Data Protection 101, our series on the fundamentals of information security. …