Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Uber, the ride-sharing giant hit with a number of scandals in recent months, is now suspected of operating a program to hide nefarious tactics. [Read More]
Apple rushes to patch critical macOS High Sierra vulnerability that can be exploited to gain root access to a system [Read More]
UK-based Clarkson, one of the world’s largest shipping companies, informed the public that it suffered a data breach and hackers may release some data [Read More]
Highly sensitive data belonging to the US Army Intelligence and Security Command (INSCOM) exposed due to unprotected AWS S3 bucket [Read More]
Bulletproof Coffee has sent out several payment card breach notifications in the past year. The company is having difficulties keeping hackers out [Read More]
Imgur rushes to notify users after learning that hackers stole data associated with at least 1.7 million accounts back in 2014 [Read More]
Acer, Dell, Fujitsu, HPE, Lenovo, Intel and Panasonic working on patches for recently disclosed vulnerabilities affecting Intel CPUs [Read More]
Two US states are investigating Uber's cover-up of a hack at the ride-sharing giant that compromised the personal information of 57 million users and drivers. [Read More]
The theft of the personal data of 57 million Uber riders and drivers highlights how vulnerable we make ourselves when we install apps on our mobile phones and tablet computers. [Read More]
Uber said that hackers accessed the personal data of 57 million of its users in a breach that had been covered up by the company for more than a year. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Adam Meyer's picture
It’s that time of year again when we look back at the past year and try to anticipate what we can expect in the coming year. Here is my cybersecurity forecast for 2018.
Marc Solomon's picture
Full automation ignores the key inputs from human intelligence. When it comes to “orient” and “decide,” the human element needs to be involved.
Joshua Goldfarb's picture
The way in which the security community typically reacts after certain high profile incidents is somewhat alarming. There are typically two responses, neither of which is particularly appropriate or helpful: Mocking and Ambulance chasing.
Adam Meyer's picture
Threat intelligence playbooks that support strategic and operational levels help teams be more effective, more certain in their actions and allow security programs to be agile/maintained as situations change.
Alastair Paterson's picture
The Equifax breach has had a damaging impact on the company and has put its customers at risk. But it has also served as a wake-up call for organizations around the globe.
Ashley Arbuckle's picture
MSSPs help alleviate the complexity of maintaining and managing a proliferation of security products and point solutions in order to get their full value.
Josh Lefkowitz's picture
Regardless of the extent to which your organization shares information, there’s a lot we can all learn from the WireX botnet takedown.
Adam Meyer's picture
Want to hire the best analyst? Then first define what is usable and then focus your search on those characteristics.
Marc Solomon's picture
To more effectively prioritize to ensure relevance of threat intelligence, humans must be involved. After all, who understands your environment better than you?
Danelle Au's picture
How do you decide where to focus your security efforts to break the kill chain? Let’s take a look at three different approaches.