Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The U.S. Treasury Department slaps sanctions against the Chatex cryptocurrency exchange and offers multi-million-dollar rewards for information on the REvil ransomware gang. [Read More]
A dozen cybersecurity-related acquisitions were announced in the first week of November 2021. [Read More]
Software supply chain security jitters escalated again Friday with new “critical severity” warnings about malware embedded in two npm package managers with millions of weekly downloads. [Read More]
The U.S. Department of State is offering $10 million for information leading to the identification or location of senior members of the DarkSide ransomware gang. [Read More]
The FBI says ransomware operators leverage information on mergers, acquisitions and stock valuations to target and extort companies. [Read More]
North Korean state-sponsored hacking group Lazarus was observed targeting an IT asset monitoring solution vendor. [Read More]
Illumio's newest product seeks to solve the two primary security issues that come with moving to the cloud: the danger of accidental misconfigurations and the loss of visibility. [Read More]
Security responders are scrambling this weekend to assess the damage from crypto-mining malware embedded in an npm package (JavaScript library) that counts close to 8 million downloads per week. [Read More]
In the event of a nation-state attack, Microsoft's new security offering will provide proactive monitoring and notification to non-profit organizations. [Read More]
CISA warns that the BlackMatter ransomware has targeted multiple critical infrastructure entities in the United States, including organizations in the food industry. [Read More]

FEATURES, INSIGHTS // Disaster Recovery

rss icon

Marcus Ranum's picture
When you start your metrics program, you'll find that a great deal of information can be gleaned from existing data that gets stored in various places – most likely in your system logs.
Chris Hinkley's picture
A multi-layered breach detection and recovery plan is a must to protect your organization, making the difference between a catastrophic breach that devastates your business and a breach that’s quickly contained and terminated.
Chris Poulin's picture
There’s no one size fits all disaster survival plan: a server compromise is vastly different than full scale nuclear attack, and both require situationally appropriate responses.
Danelle Au's picture
What can we glean from "Superstorm" Sandy that will help us deal with security events as disruptive in nature as Super Storm Sandy? Do we need a strategic shift in how we respond to incidents? What are key security observations from this storm?
Rod Rasmussen's picture
In the security and privacy world, 2012 is turning out to be the year for Internet security bills. But why now and why so many Internet protection bills suddenly coming up in Congress?
Ram Mohan's picture
The Amazon Web Services Cloud Outage showed the world that the cloud — while great — does not absolve companies from taking fundamental precautions to safeguard their systems online.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!