Security Experts:

long dotted


Yahoo is notifying some users that hackers may have been able to use a maneuver to break into their accounts without stealing passwords. [Read More]
IBM's Watson is ready to help security analysts sift through network alerts thrown up by the QRadar security intelligence platform in what IBM calls its Cognitive SOC. [Read More]
RSA improves several products and launches new services as it unveils its Business-Driven Security offering [Read More]
The Department of Homeland Security published a new report providing additional indicators of compromise (IOC) and analysis using the phases of the cyber kill chain to detect and mitigate threats from the Russia-linked GRIZZLY STEPPE hackers. [Read More]
Demisto, a Cupertino, Calif.-based maker of software that helps Security Operations team fight “alert fatigue” and reduce the time to respond to a breach has raised $20 million Series B round of funding. [Read More]
Hundreds of Arby’s restaurants affected by breach. Hundreds of thousands of credit and debit cards compromised [Read More]
New study shows that companies in the US, UK and Germany are increasingly interested in taking out cyber insurance [Read More]
InterContinental has confirmed that its payment card processing systems have been breached - 12 hotels in the Americas region are affected [Read More]
The hacker who targeted mobile forensics firm Cellebrite has leaked some tools stolen from the company’s systems [Read More]
LogicHub is building a new type of threat detection system based on human security intelligence rather than simply big data analysis. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Marc Solomon's picture
There are strategies you can use so that the risk score is more relevant and useful within your specific environment.
Steven Grossman's picture
While we all dream of solving the skills shortage by completely automating the entire detection and response process, it is simply unlikely to happen in the foreseeable future.
Scott Simkin's picture
Threat intelligence can play an important role in improving an organization’s overall cybersecurity posture, provided the right case is made and the right processes are put in place.
Lance Cottrell's picture
When properly integrated, detection, response, and prevention reinforce each other, each making the other more effective.
Joshua Goldfarb's picture
It’s time to bring the capability to achieve a mature security posture through a robust security operations function to the masses.
Adam Meyer's picture
At the end of the day, whatever your cyber threat intelligence plan and process is, it should drive faster and smarter decisions that minimize your risk exposure.
Ashley Arbuckle's picture
There’s a lot organizations can do to strengthen their incident response capabilities so that they’re up to the test. Here are a few ways to take charge and ensure a better outcome...
Joshua Goldfarb's picture
Defenders must think more broadly about the risk they're trying to mitigate, rather than getting distracted and instituting one-off policies and solutions to new means that may arise.
Marc Solomon's picture
Threat intelligence that incorporates external and internal data can go a long way toward helping you mitigate breaches during the holiday shopping frenzy.
Travis Greene's picture
Unlike the political arena, or even other divisions of the technology industry, when working in IT security, people rarely notice when everything is done perfectly.