Security Experts:

long dotted


Facebook provides update on recent hacker attack. The company says there is no evidence the attackers accessed any apps using the compromised tokens [Read More]
Industry professionals comment on the Facebook data breach that affected 50 million accounts and resulted in the tokens of 90 million users being reset [Read More]
Facebook shares more details about the massive hack affecting 50 million accounts, including the exploited bugs, impact on users, attack timeline, and impact on Facebook [Read More]
Facebook says it recently discovered a security breach affecting nearly 50 million user accounts, where hackers exploited its "View As" feature, which lets people see what their profiles look like to someone else. [Read More]
FBI and DHS called in by the Port of San Diego after a piece of ransomware infected some IT systems [Read More]
Chronicle launches VirusTotal Enterprise, a platform that combines existing capabilities with expanded functionality and new features to help organizations protect their networks [Read More]
Senate Homeland Security and Governmental Affairs Committee votes to approve several cybersecurity bills, including for incident response, a diagnostics and mitigation program, cyber workforce rotation, supply chain security, and safeguarding federal information systems [Read More]
Mozilla has launched a new service that helps users easily check if their email addresses are part of publicly known data breaches. [Read More]
US-based online fashion retailer SHEIN informed customers recently that hackers stole their personal information. Over 6.4 million customers affected [Read More]
Industry professionals comment on various aspects of the US 2018 National Cyber Strategy announced by the White House last week [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

John Maddison's picture
Agile software and application development add a layer of abstraction and complexity that modern security tools are simply unable to secure.
Erin O’Malley's picture
Like big game hunting, cyber threat hunting is not easy and requires a unique mix of hard-earned skills and intelligence.
Torsten George's picture
The Reddit data breach illustrates the importance of rolling out an approach designed to verify the user, validate their device, limit access and privilege, and learn and adapt to new risks.
Stan Engelbrecht's picture
Security orchestration, automation, and response (SOAR) tools are increasingly effective for some of today’s most pressing security problems, which has led to growing demand across enterprise organizations.
Marc Solomon's picture
The human element will always remain vital in security operations, but automation will allow us to move through processes faster for better decisions and accelerated action.
Ashley Arbuckle's picture
We’ve seen an evolution from more traditional simulation exercises that use a Red Team to identify vulnerabilities and launch mock attacks and a Blue Team to detect and respond to attacks, to Purple Teaming exercises.
Steven Grossman's picture
Adding automation to the incident response process requires consideration of the possible threat vectors and the associated actions necessary to respond to those vectors.
Rafal Los's picture
Boards used to care only about one thing - that your company didn't get breached on their watch. Those days, sadly, are behind us.
Marc Solomon's picture
Automating threat intelligence prioritization also allows you to proactively deploy the right intelligence to the right tools with greater speed and confidence.
Ashley Arbuckle's picture
Managed security services are now evolving to managed detection and response (MDR) services that include security monitoring, advanced threat detection, and incident readiness and response.