Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Amendments to U.S. intelligence and defense policy bills include Russian and North Korean hacking, cybersecurity strategy, vulnerability disclosures, and information leaks [Read More]
Owner of cheating service Ashley Madison offers to pay $11.2 million to settle data breach lawsuits [Read More]
Over 750 domains hijacked and pointed to RIG exploit kit after attackers accessed a web portal belonging to a technical partner of French registrar Gandi [Read More]
Boundary protection weaknesses remain the most prevalent in critical infrastructure sectors, according to assessments conducted in 2016 by ICS-CERT [Read More]
Human error led to the personal details of millions of Verizon customers being exposed online, but the telecoms giant has downplayed the incident [Read More]
Fifty-two percent of businesses admit that employees are their biggest weakness in IT security, according to a survey of 5,000 businesses around the globe. [Read More]
Cybercriminals used PoSeidon PoS malware to steal payment card and biometric data from Avanti kiosks [Read More]
WWE left unencrypted personal details of more than 3 million customers exposed on AWS in at least two separate databases. [Read More]
Kaspersky releases source code of Bitscout, a compact and customizable tool designed for remote digital forensics [Read More]
Bithumb, one of the world’s largest cryptocurrency exchanges, suffered a data breach. Hackers used stolen data to empty wallets [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Adam Meyer's picture
With sound and timely operational threat intelligence, you can make life a lot harder for adversaries and have a much better understanding of how your organization is positioned against today's cyber threats.
Joshua Goldfarb's picture
All the activity around the WannaCry ransomware attack really did make me want to cry. But not for the reasons you might expect. So what was it that nearly brought me to tears?
Marc Solomon's picture
Threat intelligence integration done right will allow you to act on threat intelligence efficiently and effectively using your existing security tools and services.
Rafal Los's picture
Don’t overlook the importance of having something that’s repeatable. To be repeatable, a process must be well-documented, well-understood and well-practiced.
Marc Solomon's picture
To harness the power embedded in disparate sources of threat data requires aggregating it and translating it into a uniform format for analysis and action.
Joshua Goldfarb's picture
The European Union’s General Data Protection Regulation includes an aspect that seems particularly relevant to the field of security operations and incident response.
Marc Solomon's picture
Security professionals want insights into the adversaries themselves – the tools as well as the tactics, techniques and procedures (TTPs) they’re using – to strengthen defenses and make life much more difficult for the bad guys.
Joshua Goldfarb's picture
Organizations should not be lured into a false sense of security if they deal in information or data that are not typically sought after by nation-state attackers.
Marc Solomon's picture
A threat intelligence platform (TIP) needs to operationalize and apply intelligence as the glue to reduce fragmentation.
Marc Solomon's picture
Companies can make their entire security infrastructure more effective by using this threat intelligence as the glue to integrate layers of point products within a defense-in-depth strategy.