Security Experts:

long dotted


A U.S. judge has rejected Yahoo’s data breach settlement, citing, among other things, inadequate disclosure of the settlement fund and high attorney fees. [Read More]
Bangladesh will soon file a lawsuit in New York against a Philippine bank over its involvement in one of the biggest-ever cyber heists, the country's central bank governor said. [Read More]
Salt Security emerges from stealth mode with a solution designed to identify and prevent API attacks and $10 million in funding. [Read More]
Being GDPR-ready can bring companies significant benefits beyond compliance, including shorter sales delays and fewer or less serious data breaches, according to Cisco’s 2019 Data Privacy Benchmark Study. [Read More]
DHS issues an emergency directive instructing federal agencies to take measures to mitigate DNS hijacking attacks after several government domains were targeted by malicious actors. [Read More]
The newly announced Act to Strengthen Identity Theft Protections in North Carolina proposes that ransomware attacks be treated as data breaches. [Read More]
VLC responds to criticism over the lack of HTTPS for software updates, claiming that the security risk is not as big as some suggest. [Read More]
Cybersecurity professionals comment on the impact of the U.S. government shutdown, which is the longest in U.S. history, nearing one month. [Read More]
Mondelez International filed suit against Zurich American Insurance Company over a $100 million insurance claim for damage caused by NotPetya, citing the fairly standard 'act of war' exclusion in many insurance policies. [Read More]
People across the world are expecting major cyber-attacks against their own country, a survey of more than 27,000 respondents found. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Marc Solomon's picture
Collaboration holds the key to improved time to detection and response, so teams can better address the concerns that permeate the organization when a large-scale attack happens.
Marc Solomon's picture
ThreatQuotient's Marc Solomon talks with Glen Jones, senior director of Identity and Risk Products at Visa, to discuss on cyber threat and payment card data protection.
Ashley Arbuckle's picture
Through security orchestration and automation, you can gather threat intelligence from the cloud, translate it into a useable format and create new blacklists.
Stan Engelbrecht's picture
Stan Engelbrecht takes a look at how automation and orchestration can replace chaos with order, and how security folks in management positions can benefit from this needed change.
Lance Cottrell's picture
Actively investigating and infiltrating criminal groups online is not “hacking back,” but it may provoke that as a response.
Josh Lefkowitz's picture
A downfall of automation in security is the fact that even some of the most sophisticated tools aren’t always capable of blocking all the threats they were designed to block.
Travis Greene's picture
How you view security operations will make a difference in how fast your organization can deliver software and mitigate breach damage.
John Maddison's picture
Agile software and application development add a layer of abstraction and complexity that modern security tools are simply unable to secure.
Erin O’Malley's picture
Like big game hunting, cyber threat hunting is not easy and requires a unique mix of hard-earned skills and intelligence.
Torsten George's picture
The Reddit data breach illustrates the importance of rolling out an approach designed to verify the user, validate their device, limit access and privilege, and learn and adapt to new risks.