Dave Piscitello outlined some essential tasks for organizations to take should they find themselves the victim of a DDoS. Regardless of the reason for the attack, speed is the one thing that will make all the difference in mitigation and recovery.
Despite the billions of dollars spent annually by government and private industry to protect their networks and critical data assets, the large majority of breaches can be tied directly to human error and/or a breakdown in protocol.
In order to win the war with today’s cybercriminals that are using the same attack vectors on a massive scale, a real-time, automated information platform that pre-empts ongoing attacks is an imperative.
In this podcast, Greg Hoglund talks to Ryan Naraine about the inner workings of APT attack campaigns, the legal issues around hacking-back against adversaries and why the industry needs to be more aggressive to thwart the theft of intellectual property.
One of the more interesting cyber security phenomenons I’ve witnessed recently is not only the willingness of CEOs to admit that their company has suffered a breach, but the enthusiasm in which they have shown in making the admission.
Just like travel, incident response is a business responsibility. You need to understand and practice your plans, your responsibilities, your points of engagement and the tools you have at your disposal, to meet your goals in the most effective way.
The South Carolina Department of Revenue attack went unnoticed because the security team was not able to monitor and control data access across internal network and servers, making them blind to the attack.