Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Unprotected AWS cloud storage bucket leaks internal access credentials and other critical data from Viacom [Read More]
Threat Stack, a Boston based intrusion detection startup, has raised $45 million in a Series C funding, bringing the total raised by the company to more than $70 million. [Read More]
The recent Equifax breach affects roughly 100,000 Canadian consumers, but the company’s Canada systems are not impacted [Read More]
The server distributing a version of PC utility CCleaner infected with malware might have been compromised in early July, Avast revealed. [Read More]
In response to the massive Equifax breach, New York Governor Andrew Cuomo announced plans to make credit reporting firms comply with the 23 NYCRR 500 cybersecurity regulations. [Read More]
Equifax’s cybersecurity failings, including ignored vulnerability reports and executive credentials up for sale on the dark web, revealed following the breach [Read More]
Equifax shares more details about the breach and how it was discovered by the company [Read More]
Senator Mark Warner has called for a federal investigation of credit rating agency Equifax after the company lost the personal data of 143 million customers to hackers. [Read More]
CEO Eugene Kaspersky will testify before Congress regarding the use of Kaspersky products by the U.S. government [Read More]
The Federal Trade Commission said it has begun an investigation into a massive data breach at credit bureau Equifax that may have leaked sensitive information on 143 million people. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Ashley Arbuckle's picture
MSSPs help alleviate the complexity of maintaining and managing a proliferation of security products and point solutions in order to get their full value.
Josh Lefkowitz's picture
Regardless of the extent to which your organization shares information, there’s a lot we can all learn from the WireX botnet takedown.
Adam Meyer's picture
Want to hire the best analyst? Then first define what is usable and then focus your search on those characteristics.
Marc Solomon's picture
To more effectively prioritize to ensure relevance of threat intelligence, humans must be involved. After all, who understands your environment better than you?
Danelle Au's picture
How do you decide where to focus your security efforts to break the kill chain? Let’s take a look at three different approaches.
Marc Solomon's picture
Automatically recalculating and reevaluating priorities and threat assessments ensures you continue to stay focused on what is relevant to mitigate your organization’s risk.
Adam Meyer's picture
With sound and timely operational threat intelligence, you can make life a lot harder for adversaries and have a much better understanding of how your organization is positioned against today's cyber threats.
Joshua Goldfarb's picture
All the activity around the WannaCry ransomware attack really did make me want to cry. But not for the reasons you might expect. So what was it that nearly brought me to tears?
Marc Solomon's picture
Threat intelligence integration done right will allow you to act on threat intelligence efficiently and effectively using your existing security tools and services.
Rafal Los's picture
Don’t overlook the importance of having something that’s repeatable. To be repeatable, a process must be well-documented, well-understood and well-practiced.