Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Palo Alto researchers document a new malware that leverages Windows container escape techniques and can achieve code execution on the node and spread to entire Kubernetes clusters. [Read More]
Two members of the notorious Carbanak cybercrime syndicate were sentenced to 8 years in prison, Kazakhstani authorities announced this week. [Read More]
Cisco issues fixes for a wide range of gaping security holes, including three high-risk vulnerabilities in the widely deployed Webex product line. [Read More]
Ongoing, multi-vendor investigations into the SolarWinds mega-hack lead to the discovery of new malware artifacts that could be used in future supply chain attacks, including a poisoned update installer. [Read More]
Late-state SIEM startup adds a new chief executive and banks a $200 million “growth round” investment at a $2.4 billion valuation. [Read More]
The Microsoft initiative builds on the need for APAC governments to build cyber-defense strategies and keep the region protected from attacks through strong collaboration with tech companies. [Read More]
Japan's government agencies confirm customer data was stolen from a breach at service provider Fujitsu Limited. [Read More]
Colonial Pipeline chief executive Joseph Blount said the multi-millior dollar ransomware extortion payment was necessary to lessen downstream, real-world impact in the gas supply ecosystem. [Read More]
With $40 million in Series B funding, Styra plans to expand its policy engine for automatically enforcing, monitoring, and remediating policies across IT environments. [Read More]
Adobe warns that a "priority 1" security flaw has been exploited in the wild in “limited attacks targeting Adobe Reader users on Windows.” [Read More]

FEATURES, INSIGHTS // Disaster Recovery

rss icon

Marcus Ranum's picture
When you start your metrics program, you'll find that a great deal of information can be gleaned from existing data that gets stored in various places – most likely in your system logs.
Chris Hinkley's picture
A multi-layered breach detection and recovery plan is a must to protect your organization, making the difference between a catastrophic breach that devastates your business and a breach that’s quickly contained and terminated.
Chris Poulin's picture
There’s no one size fits all disaster survival plan: a server compromise is vastly different than full scale nuclear attack, and both require situationally appropriate responses.
Danelle Au's picture
What can we glean from "Superstorm" Sandy that will help us deal with security events as disruptive in nature as Super Storm Sandy? Do we need a strategic shift in how we respond to incidents? What are key security observations from this storm?
Rod Rasmussen's picture
In the security and privacy world, 2012 is turning out to be the year for Internet security bills. But why now and why so many Internet protection bills suddenly coming up in Congress?
Ram Mohan's picture
The Amazon Web Services Cloud Outage showed the world that the cloud — while great — does not absolve companies from taking fundamental precautions to safeguard their systems online.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!