Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

UK-based Clarkson, one of the world’s largest shipping companies, informed the public that it suffered a data breach and hackers may release some data [Read More]
American pharmaceutical giant Merck reported that the recent NotPetya attack caused hundreds of millions of dollars in losses [Read More]
Attackers may have stolen information on unpatched vulnerabilities after hacking a Microsoft bug tracker back in 2013 [Read More]
In 2015 and 2016, the U.S. Federal Deposit Insurance Corporation (FDIC) may have suffered as many as 54 data breaches involving personal information [Read More]
Equifax advised victims of the recent breach on Twitter to access a fake support website instead of equifaxsecurity2017.com [Read More]
FedEx estimates that the recent NotPetya malware attack had an impact of $300 million on the company’s earnings in the latest quarter [Read More]
The recent Equifax breach affects roughly 100,000 Canadian consumers, but the company’s Canada systems are not impacted [Read More]
Equifax shares more details about the breach and how it was discovered by the company [Read More]
Equifax confirms that an Apache Struts vulnerability exploited in the wild since March has been used to breach its systems [Read More]
Industry professionals comment on the Equifax hack, which may affect as many as 143 million people [Read More]

FEATURES, INSIGHTS // Disaster Recovery

rss icon

Marcus Ranum's picture
When you start your metrics program, you'll find that a great deal of information can be gleaned from existing data that gets stored in various places – most likely in your system logs.
Chris Hinkley's picture
A multi-layered breach detection and recovery plan is a must to protect your organization, making the difference between a catastrophic breach that devastates your business and a breach that’s quickly contained and terminated.
Chris Poulin's picture
There’s no one size fits all disaster survival plan: a server compromise is vastly different than full scale nuclear attack, and both require situationally appropriate responses.
Danelle Au's picture
What can we glean from "Superstorm" Sandy that will help us deal with security events as disruptive in nature as Super Storm Sandy? Do we need a strategic shift in how we respond to incidents? What are key security observations from this storm?
Rod Rasmussen's picture
In the security and privacy world, 2012 is turning out to be the year for Internet security bills. But why now and why so many Internet protection bills suddenly coming up in Congress?
Ram Mohan's picture
The Amazon Web Services Cloud Outage showed the world that the cloud — while great — does not absolve companies from taking fundamental precautions to safeguard their systems online.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!