Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

SafeBreach warns of a new PowerShell backdoor that pretends to be part of the Windows update process. [Read More]
California startup Bolster banks early-stage venture capital funding to build a fraud prevention platform for businesses. [Read More]
European venture capital and private equity firm Smartfin has acquired Hex-Rays, the company behind the widely deployed IDA Pro software disassembler. [Read More]
Microsoft releases patches to address more than 90 security defects affecting products in the Windows ecosystem but there's no fix yet for a pair of exploited Exchange Server bugs. [Read More]
The new funding gives Minneapolis-based NetSPI an extended runway to compete and find profits in the fast-growing attack surface management business. [Read More]
Microsoft intercepts a Lazarus sub-group rigging popular open source software utilities to plant dangerous malware implants. [Read More]
The Ukrainian government is proactively warning that Russia is planning “massive cyberattacks” against critical infrastructure targets in the energy sector. [Read More]
CrowdStrike is elbowing its way into new security markets with a planned acquisition of attack surface management startup Reposify and a strategic investment in API security vendor Salt Security. [Read More]
The new sanctions designate Iran’s Ministry of Intelligence and Security (MOIS) and its Minister of Intelligence for engaging in cyber-enabled activities against the United States and its allies. [Read More]
Streaming media startup Plex is scrambling to reset user passwords after a database hack that included the theft of emails, usernames, and encrypted passwords. [Read More]

FEATURES, INSIGHTS // Disaster Recovery

rss icon

Marcus Ranum's picture
When you start your metrics program, you'll find that a great deal of information can be gleaned from existing data that gets stored in various places – most likely in your system logs.
Chris Hinkley's picture
A multi-layered breach detection and recovery plan is a must to protect your organization, making the difference between a catastrophic breach that devastates your business and a breach that’s quickly contained and terminated.
Chris Poulin's picture
There’s no one size fits all disaster survival plan: a server compromise is vastly different than full scale nuclear attack, and both require situationally appropriate responses.
Danelle Au's picture
What can we glean from "Superstorm" Sandy that will help us deal with security events as disruptive in nature as Super Storm Sandy? Do we need a strategic shift in how we respond to incidents? What are key security observations from this storm?
Rod Rasmussen's picture
In the security and privacy world, 2012 is turning out to be the year for Internet security bills. But why now and why so many Internet protection bills suddenly coming up in Congress?
Ram Mohan's picture
The Amazon Web Services Cloud Outage showed the world that the cloud — while great — does not absolve companies from taking fundamental precautions to safeguard their systems online.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!