A Review of the Best News of the Week on Cyber C-Suite Views

Famous malware threats: Where are they now? (CSO Online, Aug 29 2017)
The headlines may be dominated by news of NotPeyta and Wannacry, but watch out for the ‘golden oldie’ malware like Conficker and Zeus. They are still dangerous…

How Effective Boards Drive Security Mandates (Dark Reading, Sep 01 2017)
To reduce risk, directors need to become significantly more aware of their companies’ security practices and be held accountable to high-level security standards. Here’s how some of the most effective boards are becoming more hands-on…

Cybersecurity help wanted: Asperger people (CSO Online, Aug 31 2017)
People with Asperger Syndrome have distinct advantages when it comes to combating cyber crime…


Sponsored by LogRhythm
SIEM Magic Quadrant
Gartner Positions LogRhythm in SIEM Leaders Quadrant for 5th Consecutive Year. Get the report


Illinois CISO Discusses the State Cybersecurity Strategy (Government Technology, Aug 27 2017)
Illinois state government has launched a 2017-2019 cybersecurity strategy that is both bold and ambitious. Here is what state Chief Information Security Officer (CISO) Kirk Lonbom had to say about where the state is now and where it is going regarding government cyberdefense…

Art Coviello On The Urgent Need for Instrumented Security (Verodin, Aug 22 2017)
It sounds bizarre, but most CISOs have no idea if their security solutions are actually working. They are making huge investments, but not seeing huge value…

Forcepoint Snaps Up RedOwl (Dark Reading:, Aug 28 2017)
Forcepoint today announced that it is acquiring RedOwl in a move to expand the capabilities of its data leakage protection and insider threat products…

Juniper Networks to Buy Cyphort for Threat Detection (Dark Reading, Sep 01 2017)
Juniprt will integrate Cyphort into its Sky ATP platform to support more file types, and offer on- and off-premise support, analytics, and improved malware detection…

IVP leads $40 million investment in Qadium’s ‘beyond the firewall’ security solution – VentureBeat (VentureBeat, Aug 31 2017)
The startup indexes every device on the public internet — a set of devices with publicly routable IP addresses assigned to them at a given time — every hour. It uses this data to flag risks and security breaches an organization may face…

How to measure cybersecurity effectiveness — before it’s too late (CSO Online, Aug 31 2017)
The majority of organizations don’t apply metrics to their cybersecurity efforts, and those that do often measure the wrong things. Here’s how to ensure your cybersecurity projects pay off…