Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Kaspersky files new lawsuit over the U.S. government’s software ban, this time challenging the National Defense Authorization Act (NDAA) [Read More]
Bitmessage developers rush to patch remote code execution vulnerability in PyBitmessage in response to a zero-day attack [Read More]
IBM releases firmware and operating system updates to address the Meltdown and Spectre vulnerabilities in Power Systems servers [Read More]
Senator who conducted 4-month investigation into Equifax breach wants answers after credit agency admits that hackers accessed types of data not mentioned in initial disclosure [Read More]
VMware starts releasing patches and workarounds for Virtual Appliance products in response to the Spectre and Meltdown vulnerabilities [Read More]
The personal details of 800,000 customers of Swiss telecoms giant Swisscom were compromised in a data breach [Read More]
Cisco is aware of attacks exploiting CVE-2018-0101, a critical remote code execution and DoS vulnerability affecting the company’s firewalls [Read More]
Intel has started releasing new firmware updates that should address the Spectre vulnerability after the first round of patches caused problems [Read More]
7,960 hours of triaging would take more than 47 employees doing nothing but triaging 24 hours a day, seven days a week. [Read More]
The massive 2016 breach that Uber covered up for more than a year was the work of a couple of individuals from Canada and Florida [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Stan Engelbrecht's picture
Responding to an incident can require extreme time-sensitivity and when tensions are running high, it’s easy to miss something important along the way.
Joshua Goldfarb's picture
When a high profile event like Meltdown/Spectre comes around, organizations need actionable information that they can use to mitigate their risk and get back to worrying about their core business.
Stan Engelbrecht's picture
The rapidly evolving threat landscape, constantly changing best practices, and surplus of security tools make it easy to overlook important steps during incident response (IR) planning.
Ashley Arbuckle's picture
Regularly practicing and refining your incident response plan so that you can proactively strengthen defenses and improve cyber hygiene requires ongoing attention by skilled security professionals with IR expertise.
Justin Fier's picture
With a skills gap of over a million cyber security professionals worldwide, how can organizations stay ahead of sophisticated and fast-moving attacks?
Adam Meyer's picture
It’s that time of year again when we look back at the past year and try to anticipate what we can expect in the coming year. Here is my cybersecurity forecast for 2018.
Marc Solomon's picture
Full automation ignores the key inputs from human intelligence. When it comes to “orient” and “decide,” the human element needs to be involved.
Joshua Goldfarb's picture
The way in which the security community typically reacts after certain high profile incidents is somewhat alarming. There are typically two responses, neither of which is particularly appropriate or helpful: Mocking and Ambulance chasing.
Adam Meyer's picture
Threat intelligence playbooks that support strategic and operational levels help teams be more effective, more certain in their actions and allow security programs to be agile/maintained as situations change.
Alastair Paterson's picture
The Equifax breach has had a damaging impact on the company and has put its customers at risk. But it has also served as a wake-up call for organizations around the globe.