Security Experts:

long dotted


Elexon, a company involved in managing the electricity market in the UK, reported being hit by a cyberattack that impacted its internal IT systems. [Read More]
Access to one of the most powerful supercomputers in the United Kingdom was suspended this week following a cyberattack. [Read More]
Enterprise identity protection company Semperis raises $40 million in a Series B funding round, which it will use to expand globally. [Read More]
After initially claiming that it found no evidence of data being stolen as a result of the recent ransomware attack, Australian shipping giant Toll has admitted that some data has been stolen. [Read More]
Cloud infrastructure provider DigitalOcean is informing customers that it inadvertently exposed some of their data to the Internet. [Read More]
New York state's top prosecutor announces that the company Zoom would improve security measures, after flaws were detected as the video conferencing platform soared in popularity amid the coronavirus pandemic. [Read More]
Australian shipping giant Toll has shut down some of its IT systems after discovering a piece of ransomware. This is the second ransomware incident disclosed by the company this year. [Read More]
GoDaddy has been notifying customers of a data breach that may have resulted in their web hosting account credentials getting compromised. [Read More]
The FCC has yet to fully address cyber-security risks in its systems, a newly published report from the United States Government Accountability Office (GAO) reveals. [Read More]
Zoom has announced a series of security improvements, including better encryption and the possibility for admins to choose data center regions. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Marc Solomon's picture
With capabilities to quickly curate and integrate new threat data sources across your operations, you’re prepared for whatever the future brings.
John Maddison's picture
By combining ML and AI with a team of advanced cybersecurity professionals to deploy true AI-driven security operations, organizations can stay a step ahead of cybercriminals.
Marc Solomon's picture
With an extensible platform and flexible data model, you can take full advantage of the volume and variety of data to gain insights, and the technologies in your ecosystem to accelerate detection and response and mitigate risk.
Jim Ducharme's picture
Heightened anxiety is a normal consequence of drastic change, and it’s natural for the entire organization to be stressed by the shift to a fully remote work environment.
Preston Hogue's picture
The healthcare industry will need advanced security measures to identify and mitigate flaws in new apps carrying the world’s most sensitive, regulated information.
Marc Solomon's picture
The LEAD threat intelligence framework is a perfect example of the symbiosis between technology and people to strengthen security posture.
Gunter Ollmann's picture
Cyber range scenarios provide real insights into an organization’s capabilities and resilience against threats, along with the confidence to tackle them when they occur.
Gunter Ollmann's picture
While defense scoring lowers the barrier to sharing defensive success insights, it does not yet address the insights gained from learning from others’ failures and the stigma of a breach.
AJ Nash's picture
Elevating from the Cyber threat intelligence (CTI) team concept to an “intelligence team” concept is the next generation of intelligence practice within the private sector.
Marc Solomon's picture
Threat intelligence value comes down to relevance and accessibility, which requires curation into a customized enrichment source, aggregating data filtered by a range of factors.