Security Experts:

long dotted


The 2016 data breach that Uber made public in November 2017 impacted over 25 million riders and drivers in the United States, the Federal Trade Commission (FTC) reveals. [Read More]
Palo Alto Networks acquires Israel-based incident response firm Secdo. Financial terms not disclosed, but some reports say Palo Alto will pay $100 million [Read More]
Best Buy customers may have had their payment card data stolen as a result of the breach suffered by online services provider [24] [Read More]
The need for improved automation to reduce the time for manual involvement also shows in users' top frustrations with current security solutions. [Read More]
Delta Air Lines, Sears Holdings and likely other major companies were affected by a payment card breach suffered last year by online services provider [24] [Read More]
Facebook said personal data on as many as 87 million users was improperly shared with British political consultancy Cambridge Analytica. [Read More]
Organizations are getting better at discovering breaches internally, with the detection time dropping to 57.5 days in 2017 from 80 days in 2016, according to FireEye’s Mandiant [Read More]
Intel will not release patches for some CPUs affected by Meltdown and Spectre, including Bloomfield (Xeon), Clarksfield, Gulftown, Harpertown Xeon, Jasper Forest, Penryn/QC, SoFIA 3GR, Wolfdale (Xeon) and Yorkfield (Xeon) [Read More]
Several natural gas pipeline operators in the United States affected by a cyberattack that hit a communications system provided by a third party [Read More]
VMware acquires threat detection and response firm E8 Security. This is the third cloud and security-related acquisition made by VMware in less than two months [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Stan Engelbrecht's picture
Responding to an incident can require extreme time-sensitivity and when tensions are running high, it’s easy to miss something important along the way.
Joshua Goldfarb's picture
When a high profile event like Meltdown/Spectre comes around, organizations need actionable information that they can use to mitigate their risk and get back to worrying about their core business.
Stan Engelbrecht's picture
The rapidly evolving threat landscape, constantly changing best practices, and surplus of security tools make it easy to overlook important steps during incident response (IR) planning.
Ashley Arbuckle's picture
Regularly practicing and refining your incident response plan so that you can proactively strengthen defenses and improve cyber hygiene requires ongoing attention by skilled security professionals with IR expertise.
Justin Fier's picture
With a skills gap of over a million cyber security professionals worldwide, how can organizations stay ahead of sophisticated and fast-moving attacks?
Adam Meyer's picture
It’s that time of year again when we look back at the past year and try to anticipate what we can expect in the coming year. Here is my cybersecurity forecast for 2018.
Marc Solomon's picture
Full automation ignores the key inputs from human intelligence. When it comes to “orient” and “decide,” the human element needs to be involved.
Joshua Goldfarb's picture
The way in which the security community typically reacts after certain high profile incidents is somewhat alarming. There are typically two responses, neither of which is particularly appropriate or helpful: Mocking and Ambulance chasing.
Adam Meyer's picture
Threat intelligence playbooks that support strategic and operational levels help teams be more effective, more certain in their actions and allow security programs to be agile/maintained as situations change.
Alastair Paterson's picture
The Equifax breach has had a damaging impact on the company and has put its customers at risk. But it has also served as a wake-up call for organizations around the globe.