Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Slack is resetting passwords for roughly 1% of accounts for which users did not change the password after the 2015 data breach suffered by the company. [Read More]
Clinical Pathology Laboratories also impacted by the recent AMCA breach. The company says information on 2.2 million patients may have been compromised. [Read More]
Hackers accessed the accounts of Sprint customers via a Samsung website, but it does not appear that they actually breached Sprint or Samsung systems. [Read More]
Bulgaria ordered Tuesday a probe into the leak of a trove of taxpayer data in a Russia-linked cyberattack that was disclosed on the same day the former Soviet satellite nation moved to buy US-made F-16 jet fighters. [Read More]
Many companies are still failing at the basics of cyber security, and too often, organizations fail to accurately monitor all their assets. [Read More]
LaPorte County in Indiana paid a ransom of over $130,000 demanded by cybercriminals who managed to infect its systems with a piece of ransomware. [Read More]
Ransomware has been a thorny cybersecurity issue for several years, and experts debate weather. organizations should pay or not pay ransomware demands. [Read More]
United States Conference of Mayors, which represents over 1,400 mayors from cities with a population of at least 30,000, promises not to pay ransomware demands. [Read More]
Premera Blue Cross, the largest health insurer in the Pacific Northwest, has agreed to pay $10 million to 30 states following an investigation into a data breach that exposed confidential information on more than 10 million people across the country. [Read More]
Google contractors regularly listen to and review some recordings of what people say to artificial-intelligence system Google Assistant, via their phone or through smart speakers such as the Google Home. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Seema Haji's picture
As OT environments evolve, security is key to thwarting attacks with the potential to cause large and costly disruptions.
Marc Solomon's picture
Marc Solomon reviews the list of five characteristics to see how Gartner defined an intelligence-driven SOC four years ago and compare that list to where we are today.
Gunter Ollmann's picture
CISOs should invest time in applying the resources of public cloud to bring automation, scalability, and AI to solving the given problem as a platform for all customers – past, present, and future.
Devon Kerr's picture
Organizations should plan beyond initial compromise and invest in technologies, personnel and methods that foster a more complete understanding.
Marc Solomon's picture
With a platform that can act as a virtual cybersecurity situation room, teams and team members can share the same pool of threat data and evidence to conduct investigations collaboratively.
Stan Engelbrecht's picture
Security teams should always be on the lookout for ways to become more proactive by predicting and anticipating their adversaries’ next moves
Marc Solomon's picture
Like the teams that progress through to the NCAA National Championship, you’ve now pared down “the threat landscape” to “your threat landscape” and set yourself up for success.
Gunter Ollmann's picture
As malware writers harness AI for cybercrime, the security industry must push forward with a new generation of dissection and detonation technologies to prepare for this coming wave.
Josh Lefkowitz's picture
It can be difficult for teams to determine how to obtain and incorporate data from encrypted chat service platforms into their collection strategies in a meaningful way.
Torsten George's picture
The anatomy of a hack has been glorified and led to the common belief that data breaches typically exploit zero-day vulnerabilities and require a tremendous amount of code sophistication.