Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

New Mexico school districts, universities, and government agencies have collectively spent millions of dollars to regain control of their computer systems after being hit by ransomware. [Read More]
UK financial technology company Finastra has disclosed a data breach that may involve ransomware. [Read More]
The U.S. Department of Health and Human Services (HHS) was targeted with a DDoS attack on Sunday, but the attack failed to cause disruption. [Read More]
The European Network of Transmission System Operators for Electricity (ENTSO-E) says its corporate network has been breached. [Read More]
The City of Durham and the Durham County government in North Carolina are in the process of recovery after experiencing what appears to be a ransomware attack on March 6. [Read More]
Employing techniques usually associated with nation-state threat actors, human-operated ransomware attacks represent a growing threat to businesses, Microsoft warned. [Read More]
Australia's privacy watchdog announced legal action against Facebook Monday for alleged "systematic failures" exposing more than 300,000 Australians to a data breach by Cambridge Analytica. [Read More]
The cybersecurity company that discovered the details of 900,000 people in a Virgin Media database says the incident has been downplayed. [Read More]
UK telecommunications and media company Virgin Media has exposed the personal information of roughly 900,000 people. [Read More]
T-Mobile is sending notifications to its customers to inform them of a data breach that resulted in some of their personal information being compromised. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Marc Solomon's picture
The LEAD threat intelligence framework is a perfect example of the symbiosis between technology and people to strengthen security posture.
Gunter Ollmann's picture
Cyber range scenarios provide real insights into an organization’s capabilities and resilience against threats, along with the confidence to tackle them when they occur.
Gunter Ollmann's picture
While defense scoring lowers the barrier to sharing defensive success insights, it does not yet address the insights gained from learning from others’ failures and the stigma of a breach.
AJ Nash's picture
Elevating from the Cyber threat intelligence (CTI) team concept to an “intelligence team” concept is the next generation of intelligence practice within the private sector.
Marc Solomon's picture
Threat intelligence value comes down to relevance and accessibility, which requires curation into a customized enrichment source, aggregating data filtered by a range of factors.
Craig Harber's picture
No matter how many best-of-breed protective solutions you use to defend your network, the unfortunate reality is eventually an attacker is going to get past them.
Marc Solomon's picture
Security teams need the ability to understand threats, hunt for threats and use automation effectively and responsibly.
Joshua Goldfarb's picture
When the security of our organization depends on us leaving our comfort zone, how can we ensure that we accomplish what we set out to do without putting the organization at additional risk?
Marc Solomon's picture
National Cybersecurity Awareness Month (NCSAM) is a great vehicle to raise awareness for cybersecurity and to remind every organization that the ability to improve security operations begins with contextual awareness.
Josh Lefkowitz's picture
Here’s a crash-course on the intelligence cycle and how you can apply and derive value from its core principles—no matter your role or security discipline: