Security Experts:

long dotted


Bitcoin declines 5% after hackers reportedly steal over $37 million worth of cryptocurrency from South Korean exchange Coinrail [Read More]
Atlanta information management head Daphne Rackley told the City Council that the Atlanta ransomware attack was far more serious than originally thought, and will require an additional $9.5 million to recover. [Read More]
DNA and genealogy firm MyHeritage announces that the access credentials of 92 million users have been stolen. Will Europe decide to make a high-profile example of MyHeritage early into the GDPR age? [Read More]
Several major organizations hit by data breach at PageUp, an Australian HR software firm whose platform is used around the world [Read More]
The data of more than 26 million users was compromised in the recent Ticketfly hack. Some services restored after five days [Read More]
Despite their infrastructure being disrupted, the hackers behind the VPNFilter botnet continue to target routers in Ukraine [Read More]
Ticketfly shuts down website after it was defaced by a hacker. The attacker also obtained personal information on Ticketfly customers [Read More]
Two major Canadian banks launch an investigation after hackers claim to have obtained customer information as a result of a data breach [Read More]
Three vulnerabilities discovered in IBM’s QRadar SIEM product can be chained for an exploit that allows a remote attacker to bypass authentication and execute arbitrary commands with root privileges [Read More]
FBI’s analysis of massive VPNFilter attack raises some questions on Russia-linked hacker groups. Agency advises users to reboot routers [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Marc Solomon's picture
Automating threat intelligence prioritization also allows you to proactively deploy the right intelligence to the right tools with greater speed and confidence.
Ashley Arbuckle's picture
Managed security services are now evolving to managed detection and response (MDR) services that include security monitoring, advanced threat detection, and incident readiness and response.
Justin Fier's picture
With many companies’ security tools numbering into the dozens, it is hardly surprising that all too often security teams suffer from alert fatigue and burnout – while genuine threats slip through the cracks.
Marc Solomon's picture
In a virtual cybersecurity situation room, team members can collaborate on investigations to detect threats faster, accelerate response and even anticipate what the future may hold.
Marc Solomon's picture
It is important for threat intelligence analysts, SOCs and incident responders to work together to take the right actions faster, reducing the time to response and remediation.
Marc Solomon's picture
The industry needs to share a common understanding of how to put threat intelligence into practice to address some of our thorniest security operations challenges.
Jim Ivers's picture
More vulnerabilities create more attacks; more attacks breed additional fatigue. So how can we wake up and fix the problems creating such a widespread headache?
Lance Cottrell's picture
Discussions around hacking back in Congress today rely on analogies that are too simple and use examples focused on physical self-defense that fail to capture the true nature of online interactions.
Marc Solomon's picture
It isn’t sufficient for security teams to prevent, detect and respond to attacks. Security teams also must be able to proactively investigate and understand what the latest, large-scale cyber campaign means to their organization.
Justin Fier's picture
When we look at this cycle of stealthy and silent data breaches, we have to ask ourselves: how can such tremendous amounts of data leave our corporate networks without raising any alarms?