Security Experts:

long dotted


The reports that a hacker breached FBI systems using a Plone zero-day exploit are likely false, said the developers of the CMS [Read More]
US government subcontractor inadvertently leaks information on military healthcare workers [Read More]
The recently released Joint Analysis Report (JAR) published by the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) to detail tools used by Russian hackers in cyber attacks against the United States election didn’t deliver on its promise, security experts argue. [Read More]
The FDA has released guidance on the postmarket management of cybersecurity in medical devices [Read More]
InterContinental Hotels is investigating a possible payment card breach at some of its hotels in the United States [Read More]
The latest power outages in Ukraine may have been caused by a cyberattack, according to the national energy company Ukrenergo [Read More]
A 'mere' 10.8% phishing success rate has forced Los Angeles County to notify approximately 756,000 individuals that their personal information may have been compromised. [Read More]
A Russian-speaking hacker appears to have broken into the U.S. Election Assistance Commission (EAC) systems, and has been trying to sell stolen access credentials -- including admin-level -- on the underground. [Read More]
The operators of the Ashley Madison affair-minded dating website agreed Wednesday to pay a $1.6 million penalty over a data breach exposing data from 36 million users, US officials announced. [Read More]
Yahoo disclosed on Wednesday that more than a billion user accounts may have been compromised in a hack dating back to 2013. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Lance Cottrell's picture
When properly integrated, detection, response, and prevention reinforce each other, each making the other more effective.
Joshua Goldfarb's picture
It’s time to bring the capability to achieve a mature security posture through a robust security operations function to the masses.
Adam Meyer's picture
At the end of the day, whatever your cyber threat intelligence plan and process is, it should drive faster and smarter decisions that minimize your risk exposure.
Ashley Arbuckle's picture
There’s a lot organizations can do to strengthen their incident response capabilities so that they’re up to the test. Here are a few ways to take charge and ensure a better outcome...
Joshua Goldfarb's picture
Defenders must think more broadly about the risk they're trying to mitigate, rather than getting distracted and instituting one-off policies and solutions to new means that may arise.
Marc Solomon's picture
Threat intelligence that incorporates external and internal data can go a long way toward helping you mitigate breaches during the holiday shopping frenzy.
Travis Greene's picture
Unlike the political arena, or even other divisions of the technology industry, when working in IT security, people rarely notice when everything is done perfectly.
Avi Chesla's picture
It's time to consider whether proactive defense strategies exist in the realm of real battlefields.
Scott Simkin's picture
Don’t expect to plug a cybersecurity specialist into the role of threat intelligence analyst, as the jobs require different skill sets.
Adam Meyer's picture
Cyber threat intelligence can help further optimize your incident response processes so that you can not only respond faster and better, but also reduce adversary opportunity and in turn go through fewer incident response fire drills.