Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

One of the country's biggest credit card issuers, Capital One Financial, is the latest big business to be hit by a data breach, disclosing that roughly 100 million people had some personal information stolen by a hacker. [Read More]
Capital One said on that a malicious individual was able to exploit a vulnerability in cloud infrastructure used by the company and gain access to sensitive data on more than 100 million customers and credit applicants. [Read More]
The power company in the South African city of Johannesburg has suffered serious disruptions after its systems became infected with a piece of ransomware. [Read More]
Robinhood, the company behind the popular stock trading app, informed some users that their passwords were stored in clear text. [Read More]
Louisiana Gov. John Bel Edwards has issued an emergency declaration after malware attacks against three school systems in the state have been detected. [Read More]
Software giant Citrix has completed its investigation into the data breach that resulted in the theft of business documents and other files. [Read More]
Many more healthcare companies impacted by the AMCA data breach published press releases last week (the same press release) to notify customers. [Read More]
Equifax has agreed to pay up to $700 million to consumers and US authorities over the massive 2017 data breach that impacted roughly 147 million people. [Read More]
The Wall Street Journal says Equifax will pay around $700 million to settle with the Federal Trade Commission over a 2017 data breach that exposed Social Security numbers and other private information of nearly 150 million people. [Read More]
BlackBerry Cylance has prepared an update to address a recently disclosed bypass of its AI-based antivirus, but the company has downplayed its impact. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Stan Engelbrecht's picture
What does the cyber kill chain have to do with Sherlock Holmes, and this quote in particular?
Ashley Arbuckle's picture
While we can’t turn our attention away from gathering data, we must devise new ways to deal with the onslaught of data. Humans simply can’t keep up, and the problem is getting worse.
Marc Solomon's picture
Security teams have more internal system data than they know what to do with from sources including the SIEM system, log management repository, case management systems and security infrastructure. Security analysts struggle to make sense of too much data.
Josh Lefkowitz's picture
Request for intelligence (RFI) services have quickly become both ubiquitous and prone to misleading claims in the threat intelligence market.
Stan Engelbrecht's picture
Security teams need to incorporate intent-based response, behavior-based detection, and a kill chain perspective to get a step ahead of their adversaries.
David Holmes's picture
Architects and IT security teams are looking for technology evolutions to help them manage real problems in endpoint storage and messaging.
Ashley Arbuckle's picture
Shifting to a proactive approach to incident response (IR) is critical but identifying partners who can provide the capabilities you need is a challenging task.
Marc Solomon's picture
We can make the Security Operations Center (SOC) a powerhouse by tearing down walls between the various security groups in an organization.
Devon Kerr's picture
How healthcare organizations used a trail of digital evidence to identify the type of attack they were experiencing and developed a remediation strategy.
Marc Solomon's picture
Security teams should be able to detect threats faster and use that knowledge to pivot and accelerate parallel investigations that are separate but related.