Security Experts:

long dotted


Google this week announced that it can now alert G Suite admins when it believes users have been targeted by government-backed attackers. [Read More]
Clarkson PLC (Clarksons), a global shipping services firm, has provided an update to the breach it suffered between May and November 2017. [Read More]
Hack of online community site Reddit shows that SMS-based authentication is not nearly as secure as many believe--but it is much better than no second factor authentication protection. [Read More]
Yale University revealed that hackers accessed one of its databases between 2008 and 2009 and accessed the personal information of 119,000 people. [Read More]
A data breach at the Dixons Carphone that was made public last month resulted in 10 million records being accessed by unknown actors, the consumer UK electronics retailer announced Tuesday. [Read More]
Researchers discovered two Pastebin posts that could provide more clues about the massive breach that resulted in the health records of 1.5 million Singaporeans getting stolen [Read More]
A multi-tier attack relied on compromising the shared infrastructure between a software supplying partner of an application vendor. [Read More]
Ransomware hits Chinese shipping giant Cosco. The incident led to disruptions of the company’s website, phones and email systems in the U.S. [Read More]
Siemplify, a New York-based provider of security orchestration, automation and response (SOAR) technology, has raised $14 million in Series B funding led by Jump Capital. [Read More]
State-actors were likely behind Singapore's biggest ever cyberattack to date, security experts say, citing the scale and sophistication of the hack which hit medical data of about a quarter of the population [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Torsten George's picture
The Reddit data breach illustrates the importance of rolling out an approach designed to verify the user, validate their device, limit access and privilege, and learn and adapt to new risks.
Stan Engelbrecht's picture
Security orchestration, automation, and response (SOAR) tools are increasingly effective for some of today’s most pressing security problems, which has led to growing demand across enterprise organizations.
Marc Solomon's picture
The human element will always remain vital in security operations, but automation will allow us to move through processes faster for better decisions and accelerated action.
Ashley Arbuckle's picture
We’ve seen an evolution from more traditional simulation exercises that use a Red Team to identify vulnerabilities and launch mock attacks and a Blue Team to detect and respond to attacks, to Purple Teaming exercises.
Steven Grossman's picture
Adding automation to the incident response process requires consideration of the possible threat vectors and the associated actions necessary to respond to those vectors.
Rafal Los's picture
Boards used to care only about one thing - that your company didn't get breached on their watch. Those days, sadly, are behind us.
Marc Solomon's picture
Automating threat intelligence prioritization also allows you to proactively deploy the right intelligence to the right tools with greater speed and confidence.
Ashley Arbuckle's picture
Managed security services are now evolving to managed detection and response (MDR) services that include security monitoring, advanced threat detection, and incident readiness and response.
Justin Fier's picture
With many companies’ security tools numbering into the dozens, it is hardly surprising that all too often security teams suffer from alert fatigue and burnout – while genuine threats slip through the cracks.
Marc Solomon's picture
In a virtual cybersecurity situation room, team members can collaborate on investigations to detect threats faster, accelerate response and even anticipate what the future may hold.