Security Experts:

long dotted


CompuCom shares information on the cost of recovering from a cybersecurity incident, including loss of revenue and major service disruptions. [Read More]
The developers of the PHP scripting language report finding a backdoor disguised as a typo fix in the PHP source code. [Read More]
Reuters is reporting that a draft executive order would set new rules on data breach disclosure and use of multi-factor authentication and encryption in federal agencies. [Read More]
Industrial giant Honeywell detected a malware infection that caused disruption to some IT systems. [Read More]
Researchers investigating the SolarWinds attacks has discovered a new APT group called SilverFish that has conducted cyber-attacks on at least 4720 targets worldwide. [Read More]
IoT company Sierra Wireless was recently targeted in a ransomware attack that disrupted production at manufacturing facilities. [Read More]
The company is the latest to have confirmed impact from the cyber-attack on Accellion’s File Transfer Appliance service. [Read More]
Security researchers at McAfee spot signs of the Mustang Panda cyber-espionage group targeting telecommunications companies. [Read More]
Email security company Mimecast says the SolarWinds hackers have stolen some of its source code, but it does not believe its products have been impacted. [Read More]
Threat intelligence data broker Recorded Future has acquired fraud analytics startup Gemini Advisory as part of a strategic push to expand into the financial services and payment processing markets. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Idan Aharoni's picture
As organizations’ visibility is limited to what their threat intelligence vendors cover, by definition they will never have full visibility.
Marc Solomon's picture
To gather the data and intelligence you need to fully detect and respond to threats, you need the ability to scale up and down the pyramid.
John Maddison's picture
By understanding the latest threat trends, security teams can take measures to ensure that their security strategies, including the identification and tracking of new IOCs, are being correctly updated.
Torsten George's picture
The risk of company employees walking away with sensitive data or selling their access credentials has never been greater now that a record number of individuals have been laid off.
Marc Solomon's picture
While it may be a trendy term, in cybersecurity, intelligence pivoting is pivotal to detection and response.
Joshua Goldfarb's picture
A healthy dose of self-doubt can go a long way towards keeping us on our toes and continually improving the security posture of our respective organizations.
Idan Aharoni's picture
The term "Threat Intelligence" encompasses an ever-growing set of offerings that, on an operational standpoint, have different use cases.
Marc Solomon's picture
Security tools need to integrate with a centralized repository of relevant, prioritized threat intelligence, and with all your security controls.
Rafal Los's picture
More security tools can increase your cost, increase overall complexity, and eventually decrease your organization's ability to be effective.
AJ Nash's picture
Intelligence is one of a few vital security concepts that industries are increasing their investments in as they recognize the documented value of proactive security.