Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

New York- based managed care provider Healthfirst said that roughly 5,300 of its current and members had personal information compromised as a result of a fraud scheme.
Anonymous hackers steal thousands of records from US Census Bureau. Agency says only non-confidential system have been breached.
Tanium has added a new module for its Endpoint Platform that helps organizations understand the origin, scope and cause of a cyber attack across millions of endpoints in seconds.
Following disclosures of devastating breaches of US government computer networks, officials told lawmakers even more intrusions may be discovered with investigations and deployment of new security tools.
U.S. Office of Personnel Management (OPM) warned that hackers may have accessed the personal data of roughly four million federal employees.
Please join us for an interactive webcast on April 28 to learn how to improve the resiliency of your organization's strategic risk management and business operation.
Centrify has launched a new cloud-based identity management solution designed to address the needs of hybrid IT environments of on-premises and cloud-based systems.
Fox-IT launches Cyberthreat Management Platform designed to help organizations strengthen intelligence, prevention, detection, and response operational capabilities.
WikiLeaks published thousands of documents on Thursday from last year's Sony hacking scandal, calling them an insight into the inner workings of a "secretive" firm.
Premera Blue Cross said Tuesday its computer network had been hacked, potentially exposing data from 11 million people.

FEATURES, INSIGHTS // Incident Management

rss icon

Wade Williamson's picture
In security circles, 2014 was known colloquially as “the year of the breach.” However, 2015 almost doubled the 2014 tally of breached records, and has done so in the first eight months.
Joshua Goldfarb's picture
The way in which we as a security community seem to be approaching the topic of information sharing seems backward to me.
Joshua Goldfarb's picture
Detection is a philosophy, approach, and methodology that seeks to identify suspicious or malicious behaviors matching risks and threats the organization is concerned about.
Travis Greene's picture
No IT organization has a seemingly unlimited budget the way that Team Oracle did in the 2013 America’s Cup race. But look closer at why spending on America’s Cup racing seems so out of control and it starts to look a bit more familiar.
Mark Hatton's picture
In the world of security, there is often a significant difference between perceived reality and what is actually happening, and the public’s perception of security within your organization can be just as important as reality.
Joshua Goldfarb's picture
Tree rings occur when the growing season ends and growth stops. To avoid stagnation, a security organization must never stop growing.
Rafal Los's picture
As a security professional you must know the three categories of threats your organization faces, how to respond to each — and how to expend your resources.
Torsten George's picture
Massive data breaches are raising doubts about whether organizations are investing their security dollars in the right areas.
Danelle Au's picture
A data breach plan lays out the key steps and the key personnel to involve when a data breach happens, and needs to incorporate three elements.
Joshua Goldfarb's picture
At a high level, "big data" and "security analytics" are about the two very different, somewhat diametrically opposed, but equally important concepts of collection and analysis.