Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Jan. 22, 2020 is the deadline to seek cash payments and claim free services as part of Equifax's $700 million settlement over a massive data breach. [Read More]
The FBI, in a change of policy, is committing to inform state officials if local election systems have been breached, federal officials said Thursday. [Read More]
P&N Bank has notifed customers of a data breach that resulted in a large amount of sensitive information being compromised. [Read More]
An Albany New York airport and its computer management provider LogicalNet were attacked by ransomware over Christmas, officials said. [Read More]
Travelex, the British-based foreign currency company, will not suffer any financial impact from a cyber attack on New Year's Eve. [Read More]
Security solutions often operate in silos, straining organizational alignment and inhibiting the visibility and control needed to protect the environment. [Read More]
Foreign currency exchange Travelex has taken its UK website and services offline after malware was found on its systems on New Year’s Eve. [Read More]
An unprotected database exposed the data of all Wyze users who created an account before December 26, 2019. [Read More]
Brazil fines Facebook $1.65 million for improperly sharing users' data in a case linked to the global Cambridge Analytica scandal. [Read More]
A federal investigation didn’t turn up any evidence that cyber attacks were responsible for computer errors that disrupted voting in a North Carolina county in 2016, according to a DHS report. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Marc Solomon's picture
Visualization holds the key for quickly understanding patterns and determining which threads to pull.
Torsten George's picture
While the urge to hack back after a data breach is very appealing, going back to the basics and applying proper cyber hygiene is a better alternative.
Josh Lefkowitz's picture
No organization is fully immune to ransomware attacks, which is why having a comprehensive and well-tested incident response (IR) plan can make all the difference.
Stan Engelbrecht's picture
What does the cyber kill chain have to do with Sherlock Holmes, and this quote in particular?
Ashley Arbuckle's picture
While we can’t turn our attention away from gathering data, we must devise new ways to deal with the onslaught of data. Humans simply can’t keep up, and the problem is getting worse.
Marc Solomon's picture
Security teams have more internal system data than they know what to do with from sources including the SIEM system, log management repository, case management systems and security infrastructure. Security analysts struggle to make sense of too much data.
Josh Lefkowitz's picture
Request for intelligence (RFI) services have quickly become both ubiquitous and prone to misleading claims in the threat intelligence market.
Stan Engelbrecht's picture
Security teams need to incorporate intent-based response, behavior-based detection, and a kill chain perspective to get a step ahead of their adversaries.
David Holmes's picture
Architects and IT security teams are looking for technology evolutions to help them manage real problems in endpoint storage and messaging.
Ashley Arbuckle's picture
Shifting to a proactive approach to incident response (IR) is critical but identifying partners who can provide the capabilities you need is a challenging task.